Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Machine Learning Is Transforming Data Security

Eric D. Brown

Data is the lifeblood of any organization today so it should be easy to understand that security of that data is just as important (if not more important) that the data itself.

More reasons to put secure data in the public cloud

David Linthicum

This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud. What’s the risk in leaving the data where it is, versus moving it to a public cloud?

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility.

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

How to eliminate the security risk of redundant data

David Linthicum

Most enterprises migrate their data to the public cloud in that second way: they just cart it all from the data center to the cloud. Often, there is no single source of truth in the on-premises databases, so all the data is moved to the public cloud keeps all its redundancies. [ The essentials from InfoWorld: How to choose the right data-integration tools • How Cosmos DB ensures data consistency in the global cloud. |

How To 215

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. Cyber Security Disruptive IT information technology National securityThe time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […].

How Big Data Keeps Businesses Secure

CTOvision

Read Magnolia Potter explain how big data can be used to keep your business secure on Inside Big Data Big data has become almost ubiquitous in the world of business. From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can […].

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 7: Dark data discovery.

The Growing Legal And Regulatory Implications Of Collecting Biometric Data

Forrester IT

customer experience security & risk biometrics Compliance data Security & Risk

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

cloud security cybersecurity data security promotedI recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here.

The Latest Developments In Corporate Data Security

CTOvision

The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

Break down those cloud security silos

David Linthicum

Do you have good cloud security? The group quickly picked and installed a cloud security solution that worked well for those applications and data stores, or that they considered best of breed. Now add other sprints, other workloads and data stores, along with best-of-breed security solutions, all seemingly effective. We’re building security silos without realizing it.

Groups 100

Focus on cloud security integration between silos

David Linthicum

Do you have good cloud security? The group quickly picked and installed a cloud security solution that worked well for those applications and data stores, or that they considered best of breed. Now add other sprints, other workloads and data stores, along with best-of-breed security solutions, all seemingly effective. We’re building security silos without realizing it.

Groups 100

Analysts Answer: How Security Leaders Can Secure Against an Evolved Threat Landscape

CEB IT

They received a pdf file that redirected them to a phishing site, tricking users into sharing personal data — including payment and contact details. The incident stirred new conversations around cybersecurity and how chief information security officers (CISOs) can combat cyberattacks. . The complexity of security projects is increasing across all markets due to the mature nature of security threats and the risks involved. Security

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. We’re now being asked how we’re helping the enterprise realize more value while assessing and managing risk, security and even safety. Data is where much of enterprise value resides.

How to address IoT’s two biggest challenges: data and security

David Linthicum

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right. The reason is pretty simple: We’re collectively trying to capture fine-grained, ongoing, machine-generated data from a fast-growing universe of devices because the more data, the better the analyses are possible from that data. At the same time, it’s clear that security for IoT mostly takes a backseat to everything else.

How To 219

Big Data Cyber Security Architect Eddie Garcia Discusses Best Practices at 27 Jan Breakfast in DC

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 145

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. Cloud Computing Mobility byod data security mobility

Mobile 243

Big Data Security Presents Big Challenges

IT Toolbox

Big data means big responsibilities, and anyone worried about protecting and preserving big data needs to accept those responsibilities

Evolving to Next-Gen Data Center: Cloud, Storage, Virtualization, Security

Data Center Knowledge

How are data center managers adjusting to cloud and the explosion of data? AFCOM survey sheds light on the impact of current trends on the data center. AFCOM Cloud Computing Security Virtualization cloud data center Data Center WorldRead More.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Managers like to talk about the power of data and analysis, and the opportunity it gives them to launch new products and reach new customers. The former has opened up companies to new security risks while the latter has left some customers feeling uneasy about the privacy of their data.

GreenTec: Persistent Data Protection With Storage Level Security

CTOvision

GreenTec-USA is a pioneer in data center modularization and optimization for servers, storage, video and secure document storage. The premise behind their cyber security solutions is one that leaders in the cyber business know well – breaches are not a question of if, but when. […]. Security Companies Computer security custom firmware data Data Protection Security storage level security Storage solutions technology

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Drones: Is the Airspace above Your Data Center Secure?

Data Center Knowledge

As use of drones explodes, data center operators should include airspace protection in their security programs Read More. Data Center World Security

Six essential processes for keeping data secure

Computer Weekly

Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation

Join World Renowned Big Data Cyber Security Architect Eddie Garcia at 27 Jan Breakfast

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

What Financial Services Executives Need To Know About Data Security

CTOvision

Read why financial services executives need to know about data security on Forbes : The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. Cyber Security NewsIt’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of […].

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.