Authors: Cloud Evangelists Stephen Spector from Dell (Twitter) and Dave Asprey (Twitter) from Trend Micro In order for enterprise IT organizations to adopt public and hybrid clouds, a cloud service provider’s security controls must meet or exceed the standards set forth by the organizations themselves. In addition to Dell’s world-class cloud security provided by Dell SecureWorks, Dell…
Read MoreConsumerization is happening now, but many IT departments simply aren’t prepared to deal with the new challenges and complexities it entails. With IT managers increasingly urged by CEOs to stop saying ‘no’ and start supporting consumer tools, they need to reappraise their traditional approach. Put simply, IT needs flexible standards – they can’t say no…
Read MoreBy Vic Hargrave Question: Lisa Fulkerson asked these questions with regard to my blog Which Type of Mobile Device is More Secure – iOS or Android: What if you use your phone and computer together? And the cell phone is the computer’s modem? Is there a way to protect both while info is exchanged? Answer:…
Read MoreBy Vic Hargrave Apple rigorously scrutinizes applications before publishing them on its AppStore site, often rejecting apps that violate the company’s security and usability policies. Given this practice, it’s easy to assume that iOS mobile devices (iPhones, iPads, iTouch) are more secure than their Android counterparts. But there’s more to this story. Veracode, maker of application…
Read MoreCloudscaling is a really interesting company run by a guy who really knows cloud computing, Randy Bias. It shows in their announcement today announcement today about Open Cloud Infrastructure. Sure, we’ll see a slew of cloud announcements at this week’s Cloud Connect conference in Santa Clara, but you should take the time to read Randy’s…
Read More
Specifically, the president reiterated his administration’s stance on data security, and the need for all stakeholders to take steps to protect against cyberattacks.
Read More
As a greater portion of business operations and communications are migrated to online platforms, it is becoming clear that the burden of information security is too great for IT personnel alone.
Read More
Distributed denial of service (DDoS) attacks have been catapulted to the forefront of the cybersecurity community in recent months since becoming a weapon of choice among hacktivists and vandals.
Read More
Modernizing the nation’s power grid has been a top priority among both the U.S. government and utility companies charged with overseeing the delivery of energy resources.
Read More
In a move that is sure to gain praise from proponents of data privacy, Sprint recently began removing the Carrier IQ tracking software from the mobile devices of many of its more than 53 million subscribers.
Read More