This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and security decision makers to consider is how they will effectively secure the data itself.
photo by Galyna Andrushko
A December 2010 Cisco study revealed that 52 percent of IT officials surveyed use or plan to use cloud computing. Unfortunately, the biggest hurdle they face in bringing their data to the cloud is security. (...)
Accueil > Mots-clés > afficher un article sur la home > affiche
affiche
Articles
-
Ulf Mattsson, CTO, Protegrity: Securing the Cloud and Securing Data in the Cloud Are Not the Same
5 April 2011, by Ulf Mattsson, CTO, Protegrity Corporation -
Eric Fries, Allentis : Il est temps de s’intéresser aux indicateurs bénéfices sur prix, et qualité sur prix.
10 octobre 2023, par Marc JacobEric Fries, Allentis : Il est temps de s’intéresser aux indicateurs bénéfices sur prix, et qualité sur prix.
-
Aurélien Debièvre, Citalid Cybersécurité : « Construisons ensemble votre stratégie de gestion du risque cyber ! »
2 octobre 2019, par Emmanuelle LamandéFort des Prix de l’Innovation et du Public en 2018 et d’une récente levée de fonds, Citalid Cybersécurité revient pour l’édition 2019 des Assises de la Sécurité. L’occasion pour le groupe de présenter son approche d’évaluation des solutions de sécurité, ainsi que les dernières évolutions de sa plateforme. Comme l’explique Aurélien Debièvre, Business Developer, Citalid Cybersécurité, l’objectif est d’accompagner les entreprises dans leurs stratégies de gestion du risque cyber, et de guider les actions des RSSI (...)
-
Stephen Howes, CTO, GrIDsure: Passwords are no longer enough to protect critical data in a mobile age
17 March 2011, by Stephen Howes, CTO, GrIDsureProtecting sensitive data – be it installing a system, or managing information on behalf of in-house or third-party clients – has never been more important in a world where top-secret US files can find their way onto the web via WikiLeaks. With the explosion in mobile data access thanks to the wave of portable devices hitting the market in recent years, its high-time thought was given to whether the authentication solution you have in place is still fit for purpose.
Recent research by (...) -
Securing the Hybrid Workplace
2 February 2021, by Jacob Chacko Regional Business Head – Middle East, SaudiWith CES a staple in the tech calendar for as long as I can remember, January always heralds the launch of some of the best, and at times most bizarre, devices of the year. And despite its virtual setting, this year’s show has delivered no differently.
Indeed, products “on display” at the 2021 conference included a furry anxiety robot, a home gardening machine, and smart perfume – all of which are either already available to buy or reportedly will be later this year. Good news for all the (...) -
James Lyne, Sophos: “The end of the Internet is nigh! Also, pigs might fly.”
24 March 2011, by James Lyne, Senior Technologist, SophosIt is precisely this sensationalist nonsense that got us in to this mess years ago, but now we do have a real issue to address. IPv4, the protocol behind the majority of the Internet and your networks is quickly running out of addresses to assign, not to mention a raft of long standing security and performance issues we’ve all just ’got used to’. Exhausting the pool of addresses would mean severe challenges in growing the global online economy.
For years (at least since IPv6, the successor to (...) -
Nick Hughes, 3M: Visual Security Compliance; Protecting Data in the Age of Mobile Working
6 April 2011, by Nick Hughes, Marketing Manager, 3MMobile working is a hit with individuals and organisations, giving valuable extra flexibility and allowing workers in the field to make use of otherwise unproductive time, when using public transport for example. It is also opening up a new front in the battle over data security. While data loss due to theft of equipment, such as portable computers, is taken very seriously and can carry penalties including heavy fines or permanent bans from obtaining and holding customer details in the (...)
-
Christophe Baroux, Sysdig: The use of the cloud changes the calculation of security
4 April 2023, by Marc JacobFor its first participation in the FIC, Sysdig will have a very provided news presented with the updates of several products among which Sysdig Secure and Sysdig Monitor., many discoveries of the research team on the threats. Additionally, Sysdig has created a new foundation THE WIRESHARK FOUNDATION, the long-term custodian of the open source Wireshark project. Christophe Baroux, SEMEA Sales Director at Sysdig believes that the cloud has fundamentally changed security and addressing risks later, or even too late, in the development lifecycle has a negative impact on the rate of cloud adoption. , while increasing security and compliance risks. So using the cloud changes the calculus of security.
-
Les Assises : Tous unis pour lutter contre les menaces cyber
12 octobre 2023, par Marc JacobPrenons de la hauteur tél était le titre de la conférence plénière de al 23eme édition des Assises de la cybersécurité. La directrice des Assises Maria Iacono a débuté cet conférence en rappelant la nécessité de tous de travailler ensemble. Il faut intégrer de nouvelles technologies en harmonies avec les anciennes technologies en intégrant par exemple l’IA. Tous les intervenants ont insisté sur l’importance de la collaboration entre tous les acteurs entreprises de toutes tailles, collectivités, éditeurs service de l’Etat afin de lutter contre les menaces cyber.
-
diskeeper: Migrating to a SAN environment — Do you still need to defragment?
21 March 2011, by Diskeeper EuropeSANs typically employ a clustered/SAN file system to pool disk arrays into a virtualized storage volume. This is not NTFS, but rather proprietary software, provided by a SAN hardware or software vendor such as EMC (Celerra), NetApp, LSI (StoreAge SVM), VMware (VMFS), etc. VMFS, for example, uses between 1MB to 8MB storage blocks. This file system essentially "runs on top of NTFS", it does not replace it. Keeping in mind that every file system is a "virtual" disk, Stacking one virtual (...)