Network Security - Page 77.5

Discover Network Security News

How secure is the hybrid cloud?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The term hybrid cloud is used loosely, which is probably why so many companies say they're planning to adopt it. If you’re planning a hybrid cloud strategy, the security questions you need to think about may not be the ones you’d expect. Hybrid cloud is IT’s flavor of the year. The C-level executives in Avanade’s global Hybrid Cloud study are particularly optimistic: 75 percent believe it should be the main area of focus for their company this year; 72 percent expect to adopt hybrid cloud by 2018; and 76 percent expect the majority of their applications and services – including some critical systems like data and analytics, office applications and customer-facing services – will be running in a hybrid cloud environment within three years.

Rackspace cooking up security-secret-sharing cloud cabal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rackspace is leading an effort to create a new group of top-tier cloud companies that it hopes will share information about security in close to real time. Rackspace chief security officer Brian Kelly today told The Reg at a Sydney event that he feels cloud companies have to take a lead to address security challenges.

10 Security Questions To Ask A Cloud Service Provider

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As security teams try to help line-of-business users and other IT practitioners take advantage of cloud benefits as safely as possible, they're increasingly stepping into the role of trusted advisor. The scalability, flexibility, and convenience of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS) offerings frequently come at the cost of added risk to the business.

To Secure Modern Networks: Close The Visibility Gap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Modern networks now go beyond traditional walls to include data centers, endpoints, virtual, mobile and the cloud. These extended networks and their components constantly evolve and span new attack vectors including: mobile devices, web- enabled and mobile applications, hypervisors, social media, web browsers, home computers, and even vehicles.

Who

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The core members of a group calling itself

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.

Cloud security: We're asking the wrong questions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud. Many longtime cloud critics are crowing, "I told you so!" and waiting for the world to go back to on-premises solutions only.