SORT BY Relevancy
When we talk to people about Cloud Computing, we often hear three issues that are concerns: security, performance and availability. A lot of business leaders are concerned that the Cloud may increase the risk of their IT infrastructure and will not be accessible when their customers, employees and partners need it. Tune in to learn more on this topic and get your questions answered regarding security in the cloud..
Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside. But, there is also another critical asset which is just as much at risk. This is your 'Cloud based Infrastructure'. In today's business world, many entities now outsource their entire IT system to the Cloud. The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.
But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks. In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/datingapps/
Welcome to The Intersection podcast series. VMware recently announced how it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX™ network virtualization and the company’s business mobility solutions, AirWatch® by VMware and VMware Horizon®.
Today, we are speaking with Paul Brubaker, Director of U.S. Federal Government at AirWatch, about why this announcement is significant to government agencies.
Doubts about security have shadowed the cloud since the cloud model's inception, as IT executives looked at the prospect of giving up some control over their computing and storage infrastructures. Whether those security concerns should be greater or less than those for on-premises IT and datacenters, IT's role in a cloud initiative certainly is different from that of traditional, internal IT. Yet, the key question remains constant: How can we best protect our company data and systems?
IT security consultant and author Ira Winkler joins The Enterprise Cloud Site Radio Show on Thursday, June 26, at 2:00 p.m. EDT to discuss what IT executives can do to best protect a company's information resources during a move to a cloud-based infrastructure.
Winkler is president of the Internet Security Advisors Group and is considered one of the world's most influential security professionals. He has been named a "Modern Day James Bond" by the media. He is the author of the books Spies Among Us and Zen and the Art of Information Security and has recently been elected Vice President of the Information Systems Security Association. Winkler began his career at the National Security Agency, and went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist, at HP Consulting, and Director of Technology of the National Computer Security Association.
In this radio show, you will learn:
How the security risks in the cloud may be different from those of internal IT
Where the cloud may provide opportunities to improve IT security
What are the key questions an enterprise IT executive should ask of potential cloud partners
How to determine what security precautions a provider takes to protect its own systems
What steps an enterprise should take in maintaining a working relationship with a cloud provider
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?
Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.
Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.
Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.
In this event you will learn:
About the progress that the cloud sector and its customers have made in building a secure environment
About some of the best practices for enterprises that the Cloud Security Alliance has already identified
What types of big data applications are ready for everyday life in the cloud
How security and privacy protections in the cloud environment may evolve in the year or so to come
Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.
Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.
Earlier today a new form of malware was disclosed that is targeting iOS devices. Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.
We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.
Stan Jamrog stops by for another episode on Security issues and solutions in America. Is security really as important as I'm making it out to be? YES, an emphatic YES! There is a lot of evil out there trying to thwart America's standards of freedom. America must protect freedom at all costs due to the deaths of the people who fought for it in the past! So, come listen to a great show on security just in case you need to know how to protect enen yourselves from Tyranny!
Join Host Live Chats
- Joe Prich (56 chatters)
- SecularTalkRadio (21 chatters)
- The Spiritual Concepts Show (10 chatters)
- Angelic Realms Radio (8 chatters)
- WGAG Radio (7 chatters)
- Red Fox Radio (5 chatters)
- New Destiny Ministries (2 chatters)
- THE Collision of Faith Politics (2 chatters)
- NewMusicInferno (1 chatters)
- RotoExpertsXcom FantasySports Show (1 chatters)