article thumbnail

The Importance of an Online Encryption Policy

CTOvision

IBM’s latest Cyber Security Intelligence index report shows that: 1.5 There is a 12% year-to-year increase in security events to educate and inform organizations. There are 91,765,453 security events annually. It covers the systematic data management of the company and can also be referred to as information security policy standards when working in an on-premise, cloud, or a hybrid-computing environment.

Policies 283
article thumbnail

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Cloud Musings

Industry''s transition from custom made, one-of-a-kind IT infrastructures to the standardize, commodity based cloud paradigm is well on it''s way. IBM''s recent " Under Cloud Cover " study highlights the rapidly of this global transformation: "According to our global study of more than 800 cloud decision makers and. cloud provides. Over the next three years, cloud’s strategic importance to business.

Analysis 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cognitive on Cloud

Cloud Musings

Photo credit: Shutterstock According to the IBM Institute for Business Value the market will see a rapid adoption of initial cognitive systems. DeepMind can “remember” using this external memory and use it to understand new information and perform tasks beyond what it was programmed to do. The brain-like abilities of DeepMind mean that analysts can rely on commands and information, which the program can compare with past data queries and respond to without constant oversight. ·

SDLC 84
article thumbnail

Cloud Migration Best Practice: Classifying Your Data

Cloud Musings

In my first post of this series, “CloudMigration Part One: An Overview,” I provided a high-level summary of how enterprises should migrate applications to the cloud. In this installment, the focus is on enterprise data and why your organization may need to review and reclassify its data before moving anything to the cloud. Cloud computing has done more than change the way enterprises consume information technology.

article thumbnail

Finding a Framework for Hybrid Cloud Risk Management

Cloud Musings

(Sponsored by IBM. Originally published on Point B and Beyond ) Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies. Threats that challenge cloud-based information systems can have adverse effects on organizational operations, organizational assets, employees and partners.

article thumbnail

Fed Tech Roundup November 23

CTOvision

IBM encourages development of cloud-based apps for first responders - GCN.com. IG: State lax on information security - FCW.com. Education Department faces tough criticism from Congress on its IT security - FCW.com. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. 19 years and counting.

IBM 152
article thumbnail

The BYOD Problem

Cloud Musings

To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. This truth led IBM to offer the following Ten Rules for BYOD : 1.

Cloud 79
article thumbnail

OASIS Advances Automated Cyber Threat Intelligence Sharing with STIX, TAXII, CybOX

CTOvision

Editor's note: We saw the press release below from OASIS and wanted to share it with you since it covers some of the most important information sharing standards in the community today, STIX, TAXII and Cybox. Three foundational cyber security specifications, STIX, TAXII, and CybOX, are now being advanced through the international open standards process at OASIS. Security professionals are overwhelmed and simply don’t have time for analyzing data in disparate formats.

IBM 280
article thumbnail

Ascent Index: Cybersecurity

The Investing Edge

But it’s not just the telecommunications giant that hopes to seize on the cyber opportunity; many leading companies – be they Google, IBM, General Dynamics or countless others – have acquired information security vendors in response to the growing market need. Much of the social media chatter in October focused on cyber security legislation proposed by Congress, and its long odds of actually passing.

article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. As the 2015 theme suggests, info security is an ever-changing industry. In order to stay ahead of threats, you need to challenge today’s security thinking. 23 in all, along with new tracks like C-Suite, Identity and Securing the Ecosystem.

article thumbnail

Why the IT Security Markets Needs to be Even Greater than $60 Billion

The Investing Edge

In recent posts we’ve discussed how the shift to the cloud , the explosion of mobile usage , and the massive growth in data will help drive the next wave of productivity and economic gains for companies. But these new technologies also dramatically shif the nature of where data is, how much there is, and how it is accessed, and therefore require an entirely new approach to IT security, which is already a $60 billion market. Information security isn’t a new battle for enterprises.

Banking 98
article thumbnail

Tech Moves: Startup Haven grows team to lead new fund; PSL promotions; F5 Networks adds execs

GeekWire

F5 Networks hired Microsoft CVP Yvette Smith as SVP of customer success and business transformation and promoted Gail Coury to SVP and chief information security officer. At Microsoft, Smith led support and customer success programs for its commercial cloud business.

article thumbnail

5 (more) big challenges facing CIOs and IT leaders in 2018

mrc's Cup of Joe Blog

Balancing security with accessibility. Managing the “cloud vs on-premise” dichotomy. photo credit: FutUndBeidl via photopin cc Cloud computing is a funny trend. Concerned about security, many businesses avoided the cloud. Cloud computing has largely shed its vulnerable image, and is now viewed as more secure than on-premise. These days, businesses are rushing to the cloud. The problem is, not everything belongs in the cloud.

article thumbnail

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Last year, Amazon, Google, Microsoft and IBM began offering machine learning tools in the cloud, allowing developers easy access to an array of tools previously available only to data scientists. The 2016 GAO Information Security Report(x) stated quite emphatically that signature based intrusion doesn’t work. BlueVector is now available as a compact security appliance with 48 virtual cores and FPGAs to accelerate packet collection. Nate Crocker.

Malware 155
article thumbnail

Hardest tech roles to fill (+ solutions!)

Hacker Earth

There are a handful of go-to online communities where software architects learn and share information such as Meetup , IBM Community , Code Project , and Stack Overflow. . This blog provides in-depth information about what Data Science is and how to hire a data scientist. Companies are facing security breaches at an alarming rate, putting every web user’s data at risk. Cloud security. Security analysis.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

LAN 40
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

LAN 40
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

LAN 40
article thumbnail

Hardest tech roles to fill (+ solutions!)

Hacker Earth

There are a handful of go-to online communities where software architects learn and share information such as Meetup , IBM Community , Code Project , and Stack Overflow. . This blog provides in-depth information about what Data Science is and how to hire a data scientist. Companies are facing security breaches at an alarming rate, putting every web user’s data at risk. Cloud security. Security analysis.