Boom Times for Cloud Security

Amazon announced several initiatives at its AWS re:Invent conference that are destined to disrupt several markets Held last week in Las Vegas, the Amazon Web Services’ conference hosted more than 10,000 attendees. One such program is Amazon WorkSpaces, an Amazon provided virtual desktop (VDI) product, which will be available for a low monthly fee, starting,…

Details

Gartner Says “Agility” is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

Private cloud computing is a “reality” for half of large enterprises with agility being the key driver, according to Gartner, Inc. In a recent research report, “Private Cloud Matures, Hybrid Cloud Is Next,” the industry analyst firm said cost was an important consideration as well. Security, often cited by IT professionals as the key driver…

Details

The Devil Inside the Beltway: Not for the Faint of Heart

The Devil Inside the Beltway is a chilling memoir that documents the shambles made of Michael Daugherty’s life by apparent regulatory overreach on the part of the Federal Trade Commission (FTC) that is still underway. Reading Daugherty’s book is extremely painful for those who know Michael and that number is growing because to read his…

Details

IT Security Salaries Expected to Increase in 2014

IT-security related salaries are expected to climb in 2014, according to a survey released by TEKsystems, which polled some 900 IT leaders including CIOs, IT VPs, IT directors and IT hiring managers, Some 65% of respondents said they expected security salaries to increase. That’s up from a similar survey last year when 40% of those polled forecast a…

Details

Software Defined Radio: A Hacker’s Dream

Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard  of researchers (and attackers) looking at ways to exploit  them. Are you prepared? It is now known that your car’s GPS, toaster and medical devices are vulnerable to attack.  For the most part, built without…

Details

Trustwave Acquires Application Security Inc.

Trustwave announced on Monday that it had acquired data security provider Application Security Inc., for an undisclosed sum as Trustwave continues its strategy of acquiring security technology vendors to spur its growth. Eleven-year-old Application Security evolved from web scanning and column encryption of databases to a complete database protection company. Competitors include California-based Imperva and Israel-based GreenSQL.…

Details

HyTrust Acquires Competitor HighCloud Security

Cloud security provider HyTrust Inc. said on Thursday it had acquired HighCloud Security for an undisclosed sum, striking a deal it said would round out its security offering. The move follows HyTrust’s $18.5M Series C financing round in August and comes as enterprises increasingly deploy private cloud services. HyTrust said that it had quadrupled its sales…

Details

New Certification Launched for Healthcare Information Security and Privacy Professionals

Insurance fraud. Identity theft. Financial fraud. These are just a few of the risks associated with storing personal healthcare information online. Healthcare organizations hold some of the most private and sensitive information, and if it were to be comprised, a breach of this data could have serious repercussions for individuals and organizations alike. To address…

Details