Cloud computing is all the rage — and if more and more of Uncle Sam’s agencies are strapping on the feed bag, then market acceptance is definitely beyond the early adopter stage. By David Hamilton in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing ——– More US Federal Agencies Adopting Cloud Computing in 2013 As Security …
Shadow IT: Creeping Up on You
I’m all for cloud growth but not if it’s in the shadows of corporate IT policies. Inevitably unsanctioned cloud deployments will come back to bite the business — via substandard security, data loss, inconsistency, duplication of effort, or plain ‘ol under-the-radar (and hence un-managed) costs. The study summarized below indicates that shadow IT cloud deployments are a lot more pervasive …
Safety in Smallness? No!
As Kermit the Frog lamented, it isn’t easy being green. And it’s also that case that businesses are not safe from cyber attacks just because they (the businesses) are small. Article by Mike Pugh in Huffington Post. Emphasis in red added by me. Brian Wood, VP Marketing ——– No, Your Small Business Is Not Safe From Cyber Attacks Comedy legend …
Cloud-Based Security Market Growing
“The specialized threat analysis and protection market is forecast by TechNavio to increase at a healthy 41.3% CAGR through 2018.” “This growth will be fueled by demand for cloud-based security solutions because of budget constraints and lack of in-house expertise.” “Firms are finding it hard to manage standalone or integrated network components with in-house resources.” Summary article by Fred Donovan …
Gone Phishin’ (for access to your network)
Average everyday users are the weakest link in the cybersecurity chain. But, there is good news too: Awareness training and frequent reminders of common-sense considerations to avoid compromise are highly effective. Summary article by Paul Mah in FierceCIO and original article by Robert Lemos in eWeek. Emphasis in red added by me. Brian Wood, VP Marketing ——– 1 in 5 …
San Diego Facebooking — Say Cheese!
America’s Finest City is the proud home of many wonderful assets. Qualcomm. ServiceNow. San Diego Zoo. SPAWAR. UCSD. Point Loma. Mission Bay. Now add a facial recognition pilot program used by law enforcement. We all knew that this was coming — Vanilla Sky showed us so. Article by Lisa Vaas in Naked Security. Emphasis in red added by me. Brian …
Disrobing the Truth About Senior Executives
“The emperor wears no clothes!” Oh wait, maybe I meant to say, “The emperor looks at websites of people who wear no clothes!” Summary article by David Weldon in FierceCIO, original article by Steve Ragain in Network World. Emphasis in red added by me. Brian Wood, VP Marketing ——— From phishing to adult content, many CEOs benefit from analyst cover-ups …
Gartner: Cloud Security Market Growing
Growth be good. Article by Saroj Kar in CloudTimes. Emphasis in red added by me. Brian Wood, VP Marketing ——— Gartner Sees Cloud Security Market is Worth $3.1 Billion by 2015 In spite of the widespread belief that bringing data on the systems to an external service provider would create doubts on security, Gartner believes that the market for cloud …
Back to School: The 80/20 Rule
We keep hearing and reading about it over and over. 80% of cybersecurity threats can by prevented by good hygiene and best practices — while the other 20% requires a bit more sophistication. We’d all be better off if we looked in the mirror and started with ourselves. Even the longest journey starts with a single step. By Sara Abraham …
Baby Monitor Hacked, Home Network Attacked
WiFi-enabled consumer products — light bulbs, refrigerators, thermostats, baby monitors — are convenient, fun, and … insecure. Just because a device is “smart” (i.e., connected) doesn’t mean that it is “smart enough” to prevent unintended consequences. What’s a modern parent or homeowner to do? Article by Dan Goodin in Ars Technica. Emphasis in red added by me. Brian Wood, VP …