The Small Business Journey to the Cloud is Actually a Round Trip
The Small Business Journey to the Cloud is Actually a Round Trip By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They...
View ArticleA Tale: The Snack Supplier, the Vending Machine, and the Cloud
I recently had an interesting chat with the operator of our snack vending machine while making a coffee in the kitchen. She was restocking our machine and had her iPad sitting on the table. In their 2...
View ArticleChrome OS: So secure we don’t need security?
With the launch announcements of various Google Chrome netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of...
View Article“Hey, You, Get Off of iCloud!”
For all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are...
View ArticleWhat Are the True Dangers of the Cloud?
We often hear that security and privacy concerns are the main inhibitors to cloud adoption. But what are the true threats? Is the cloud really more dangerous than your on-site data center? I would...
View ArticleBeyond Perimeter Defense to Data-Centric Security
Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important. But with today’s cloud computing,...
View ArticleSavings with Cloud Security — A Look at the Numbers
When people talk about cloud security it can mean either 1) security for the cloud—security that protects your cloud initiatives, like protection for virtual machines or data stored in the cloud; or 2)...
View ArticleDo You Encrypt Your Data? A Plea to Businesses from an Identity Theft Victim
Recently I became a victim of identity theft. Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number. I’ve spent the last...
View ArticleHIPAA hiccups
Not a month goes by when there isn’t an announcement of a breach of electronic health records thereby disclosing personal and financial data; and that excludes breaches that are not publicly...
View ArticleOffense Must Inform Defense: The Importance of Continuous Monitoring
In light of the introduction yesterday of the seminal Cyber Security Act and the Presidents OP-Ed in the WSJ: Taking the Cyberthreat Seriously. It is time we learn a lesson from those learned by the...
View Article