How To Get The Most From Google Next 2017

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 06 Mar 2017 13:00:44 +0000

Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is the third iteration of the conference and as with the Google Cloud itself, the show is going to be bigger and better than…

Read more

Five Questions with XentIT

Credit to Author: Justin Foster| Date: Mon, 27 Feb 2017 14:00:23 +0000

We sat down with Deborah Larkins, Lead Technologist at XentIT to understand her journey with being a part of the upcoming release of Deep Security 10. XentIT is a full service IT firm specializing in information security, governance, risk and compliance, cloud technology, and managed IT services for commercial enterprises and government agencies. Founded in…

Read more

RSA Conference is a timesaver

Credit to Author: Mathias Thurman| Date: Mon, 27 Feb 2017 04:23:00 -0800

I spent several days in San Francisco on my annual pilgrimage to the RSA security conference.

This year, I attended a few sessions related to cloud security, privacy and compliance, since my world these days is consumed with enhancing the security of our cloud platform and addressing the never-ending burden of maintaining compliance with the likes of PCI, SSAE 16, SOC 2 and HIPAA, and the recent changes related to Privacy Shield, which is the replacement for the European Union’s Safe Harbor.

To read this article in full or to leave a comment, please click here

Read more

8 steps to regaining control over shadow IT

Credit to Author: Ryan Francis| Date: Thu, 23 Feb 2017 12:17:00 -0800

A dangerous practice on the rise
0 shadow it intro

Image by Pexels

“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.

To read this article in full or to leave a comment, please click here

Read more

IT leaders say it's hard to keep the cloud safe

Credit to Author: Sharon Gaudin| Date: Wed, 15 Feb 2017 12:17:00 -0800

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it.

That was one of the findings of an Intel cloud security report that surveyed 2,000 IT professionals in different countries and industries last fall.

The issue isn’t with the cloud itself, since trust outnumbers distrust for public clouds by more than two to one, according to Intel’s survey.

IT professionals told Intel that shadow IT and a shortage of cybersecurity skills are causing the most problems.

To read this article in full or to leave a comment, please click here

Read more

Moving To Serverless Cloud Apps

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 14 Feb 2017 14:31:02 +0000

One of the key benefits of the cloud is focus. Spinning up a virtual server in the cloud lets you focus on the operations and security of the operating system, you applications, and your data. Similarly migrating to a SaaS productivity suite lets you focus on your data and getting work done. This is the…

Read more

The Server Compute Evolution Continues…as does Trend Micro’s Market Leadership in Server Security

Credit to Author: Steve Neville| Date: Mon, 13 Feb 2017 13:00:42 +0000

IDC, a leading global market intelligence firm, believes that organizations need to have access to security that moves at the speed of business. In fact, one of IDC’s leading security practice analysts had this to say about securing workloads across the hybrid cloud: “Multiple techniques are essential to defend against the sophistication of today’s threats….

Read more