How to Overcome Security Issues in Cloud Computing

Cloud Security vs. Traditional SecurityThere’s a strain of conservatism among certain IT professionals — the enthusiasm for all things new and innovative is tempered by skepticism about security challenges and other issues. Part of this is simply the nature of our industry. After all, it’s our job to anticipate risks and develop creative ways to mitigate them. However, this type of caution also leads to the kind of broad thinking and blanket statements that ultimately do little to address individual security challenges on an organizational level. Broad skepticism is particularly prominent when comparing cloud security vs. traditional networks. Many IT professionals view cloud security

On-Demand Passwords Vs. Two Factor Authentication

Two factor authentication has long been considered one of the best ways to prevent fraud and protect sensitive information against intrusion. In March 2015, however, Yahoo generated a lot of press with the introduction of its on-demand password system, supposedly a more convenient, easier-to-use alternative to two factor authentication that nevertheless provides a high level of protection against threats.

Will Yahoo’s competitors start to adopt similar security on-demand intrusion protection, or will the technology fail to build on its initial promise? Let’s look beyond the hype and take a critical look at the relative merits of on-demand passwords and two

The Clinton Email Scandal: A Wakeup Call for Network Security Professionals

Pollsters and journalists alike have been describing Hillary Clinton’s path to the Democratic nomination for president in 2016 to be inevitable, but that doesn’t mean there haven’t been some bumps along the road. To date, the most significant roadblock has been the recent revelations that Clinton used a private email account and server to send and receive messages while she was Secretary of State between 2009 and 2013.

While only time will tell whether or not the scandal has an impact on Clinton’s quest to become the first female president of the United States, it highlights many of the concerns

Preventing Credit Card Hacks Through Integrity Monitoring

Recent high-profile hacks against Target, Home Depot and other major retailers have drawn attention to the vulnerability of credit card data both online and off. In the wake of this, several methods have been suggested for reducing the likelihood of future attacks. There’s no question that greater consumer awareness, as well as the adoption of smart card technology, will play a role in keeping credit card data secure in the future. But what can be done to prevent security breaches at the infrastructural level?

Efficiency-Boosting Strategies for Managing Enterprise Data

The task of managing and monitoring enterprise data is an increasingly time- and resource-consuming one. In 2012, IBM estimated that over 2.5 exabytes of data was generated every day — a number that has only increased in the years since.

While there is a growing market for enterprise network monitoring software, the sheer amount of data being produced means that effective management must begin at the organizational level. In this article, we’ll look at some strategies for managing enterprise data that organizations of any size can use to streamline their processes and make the best use of their resources.