Sept 23-25, 2013 | Bellagio Resort & Casino 3600 Las Vegas Blvd South Las Vegas, NV 89109 Hosting & Cloud Transformation Summit North America 451 Research’s annual Hosting and Cloud Transformation Summit-North America is the premier forum for executives in the hosting, cloud computing, datacenter and Internet infrastructure sectors. Join corporate leaders, end users, industry visionaries, IT practitioners, and financial …
Managed CyberSecurity White Paper (3 of 3)
AIS commissioned Matthew McCormack to write a whitepaper and deliver a webinar on what YOU can do to protect your business from a cybersecurity standpoint. The whitepaper is called, “Will Managed Services Solve My Security Problems?” Mr. McCormack is a world-renowned security expert having served in multiple technical and executive roles in the cybersecurity field within the United States government. …
Managed CyberSecurity White Paper (2 of 3)
AIS commissioned Matthew McCormack to write a whitepaper and deliver a webinar on what YOU can do to protect your business from a cybersecurity standpoint. The whitepaper is called, “Will Managed Services Solve My Security Problems?” Mr. McCormack is a world-renowned security expert having served in multiple technical and executive roles in the cybersecurity field within the United States government. …
Managed CyberSecurity White Paper (1 of 3)
Cybersecurity is a hot topic, right? Snowden. Manning. WikiLeaks. NSA. Ugh. It’s inescapable: Internet. TV. Radio. Cocktail parties. There’s no avoiding reality. What to do? AIS commissioned Matthew McCormack — one of the most noteworthy, experienced cybersecurity experts on the planet — to write a whitepaper and deliver a webinar on what YOU can do to protect your business. Mr. …
A New Twist on Cruisin’ Cars
Got CyberAutoSecurity? AP article by Tom Krisher. Emphasis in red added by me. Brian Wood, VP Marketing ——– Hackers find weaknesses in car computer systems DETROIT (AP) — As cars become more like PCs on wheels, what’s to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car’s brakes at freeway speeds, …
Cyber Crime and Security: Sophistication Escalation
Staying one step ahead of the bad guys is a never-ending endeavor. Pessimists would claim that we are already behind and will always be behind because of the ever-expanding sources and sophistication of threats. And as long as we all keep trying to handle cyber security ourselves, I agree that we’ll get and stay behind. [But there’s another option, too: …
What Do 0000, 1111, 1234 Have in Common?
Quick reader poll: Who has a passcode for your mobile device(s)? 15% of you will say “not me”. Of the rest, 10% of you use “0000” or “1111” — and another 10% of you use “1234”. Really, it’s true. Read below to learn even more. Summary article by Derek C. Slater in FierceITSecurityy, original by Kelly Jackson Higgins in Dark …
Compliance: Necessary But Not Sufficient (for Security)
Compliance is (or should be) a big dang deal for data center service providers. But it’s also important to note that compliance is not nearly sufficient to ensure security. It’s like having a lock on the window: it’s great that you have one, but do you always use it when your window is closed? And what do you do to …
Outsourcing Security: It’s Practical, Not Heresy
In the perfect world we would have enough time, money, and intellectual energy to do everything (that we care about) ourselves. Get real and face the fact that no amount of working hard to “catch up and get ahead” will ever get you (or me) anywhere near where we’d need to be to do it all. But we do have …
How Much Can an NSA Data Center Store?
Truly, the summary and the original articles say it all. Summary by Pam Baker in FierceBigData, original by Sharon Fisher in IT Knowledge Exchange. Emphasis in red added by me. Brian Wood, VP Marketing ——— Experts calculate storage capacity of an NSA data center After all the leaks that spell out just how much data the NSA is collecting from, …