Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Security in 2016 and how to lead further the end-point security market

Oct 06 by Mihai Guran

Companies will invest more in security solutions, driving overall Enterprise Security market growth. 

Read More

Cybercrime – The Trillion Dollar Business

Oct 04 by Liviu Arsene

With cybercrime shifting from user-targeted attacks to organization-targeted attacks, it stands to reason that the sophistication of their tools and malicious code has also increased. Employing advanced evasion and persistence techniques to infiltrate and compromise an organization, their goal has remained constant: to make money.

Read More

Security Market Challenges and How Security Vendors Overcome Them

Sep 30 by Liviu Arsene

With the worldwide security market reaching $22.1 billion in 2015 in terms of revenue, Garner estimates that it increased by 3.7 percent as compared to 2014. While the figures for 2016 are yet to surface, it’s safe to estimate these numbers will surely rise, especially in light of recent cyberattacks and global security awareness.

Read More

Will IoT Networks Impact Operators?

Sep 27 by Liviu Arsene

The proliferation of IoT devices for both consumers and business has opened up a new market that’s estimated to reach a whopping $661.74 billion by 2021, from $157.05 billion in 2016. Considering the obvious business opportunities, security researchers have expressed concerns regarding the security mechanisms – or lack of – bundled with “smart things”.

Read More

Despite Security Fears, Digital Transformation and the Cloud Journey Continue

Sep 22 by George V. Hulme

Many enterprises today are deeply entrenched in their digital transformation efforts, so that their business can best leverage digital technologies to compete and grow. According to a recent survey conducted by IDC for Unisys, 72% of enterprises believe that it is critical or very important for an organization to modify IT processes and resources to support a digital business model.

Read More

The Three Big Security Trends to Drive Enterprise Spend Through 2020

Sep 16 by George V. Hulme

Rapid enterprise adoption of cloud computing, mobile, and IoT is transforming how enterprises invest in enterprise security. According to a report issued earlier this year, the information security market will reach a staggering $170 billion in five years, from its current $100 billion.

Read More

Tor vs. I2P – Anonymization and B2B Opportunity

Aug 18 by Liviu Arsene

The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.

Read More

Calculating the economic impact of security incidents on critical infrastructure remains elusive

Aug 16 by George V. Hulme

With the rise of APTs and the continued interconnection of critical infrastructure business-technology systems and field systems and devices the attention toward critical infrastructure security has never been higher. And nations around the world are building both offensive and (more slowly) defensive capabilities when it comes to cyber-attacks targeting critical infrastructure.

Read More

Getting executive buy-in for identity management

Aug 12 by George V. Hulme

Some enterprise technology deployments can be handled entirely by IT, don’t require executive support or the cooperation of the entire organization. Identity management implementations are not one of these types of initiatives. They take dedicated and adequate budget, executive leadership, and long-term enterprise-wide dedication. So how do enterprises get the C-suite buy-in they need?

Read More

International Association of Certified ISAOs launches as global leadership association to support security threat and defense information

Aug 10 by George V. Hulme

There are few things that everyone in the information security industry agrees upon, but the need to share threat and risk mitigation information is certainly one area where there is majority agreement. Everyone concurs that it’s essential for security professionals to share security related intelligence about their industries, about what defenses and controls work, and what controls don’t, and information about the daily changing nature of the threats out there.

Read More

Big Black Hat 2016 Story Round-up

Aug 08 by George V. Hulme

The hacks and vulnerabilities out of Black Hat USA are interesting every year. Last year much of the focus was on flaws within cars, mobile devices, and IoT. There was a lot of focus on those areas this year, too. And I expect much of the attention paid to vulnerabilities to continue to be on the extended Internet and IoT for years to come.

Read More

Supply Chain Security Vital to Organizations

Jul 29 by Liviu Arsene

Despite obvious supply chain differences between organizations in different industries, IT architects should consider their generic similarities when integrating various solutions. Quite often, the complexity of the supply chain depends on the entities working together – manufacturers, logistic providers, repackages, retail stores – meaning that security and infrastructures become complex and cumbersome to manage.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets