Cloud Security Report - Featured Image

Cloud Security Report

Our partner Alert Logic provides managed security and compliance solutions for over 3,000 customers across the globe. As part their cybersecurity research practice they review threats and attacks against their vast customer base looking for insight to share in their annual Cloud Security Report.
Wanted: Cybersecurity Crime Fighters - Featured Image

Wanted: Cybersecurity Crime Fighters

It’s like the Wild West out there for companies trying to protect their data and systems from cyber criminals. Data breaches, with multi-million dollar consequences are happening every day. Cyber criminals are becoming savvier, and their costs are going down. C-Levels are being held accountable for damaging and costly hacks and executives are scrambling to recruit the best security talent to protect their business.
Harden Your Infrastructure & Code With DevSecOps - Featured Image

Harden Your Infrastructure & Code With DevSecOps

  If you are a company that has joined the DevOps movement to integrate code and infrastructure deployment, it's likely you (or someone in your organization) have had some concerns about information security. In an effort to release products faster or reduce time to market, information security gaps can become a problem for any company. Security monitoring tools haven’t been able to keep up with the fast-paced changes being made by DevOps when releasing new features or products.
Mitigating Multi-Vector DDoS Attacks [infographic] - Featured Image

Mitigating Multi-Vector DDoS Attacks [infographic]

Over 80% of cyberattacks use a multi-vector approach to disable a network or servers.
IT Security: Data Breaches and Prevention Tactics - Featured Image

IT Security: Data Breaches and Prevention Tactics

The WTIA recently hosted an IT security panel discussion on data breaches and how companies can work to prevent them.
Webinar: Secure, Maintainable, Hybrid Cloud Deployments - Featured Image

Webinar: Secure, Maintainable, Hybrid Cloud Deployments

Industry experts are predicting a huge growth rate for Hybrid Cloud.
Is the Venom Vulnerability More Bark Than Bite? - Featured Image

Is the Venom Vulnerability More Bark Than Bite?

Venom, announced recently by security intelligence firm CrowdStrike, is a vulnerability affecting the floppy drive emulation code used by many virtualization platforms. It looks like Venom will not be as big as Heartbleed, the vulnerability discovered last year that allowed hackers to grab data from the memory of servers running affected versions of the open-source OpenSSL encryption software. However, VENOM is of particular interest to cloud-users everywhere as it is one of a very few vulnerabilities at the hypervisor that compromises the security through isolation promise of virtualization-based cloud infrastructure.
There's a New aaS in Town: Security-as-a-Service [Infographic] - Featured Image

There's a New aaS in Town: Security-as-a-Service [Infographic]

It’s time for organizations of all sizes to prepare for a more complex landscape of cyber threats: very large volumetric attacks, application attacks that target specific critical resources, and low and slow attacks that may occur below the radar.
Q1 Newsletter: 2015 - Featured Image

Q1 Newsletter: 2015

Q1 Panel Event Recap: Cloud vs Colo Smackdown New Infographic: Security-as-a-Service Featured Blog: Cloud Closed - A Rundown of Shutdowns Featured Article: The Allure of Singapore - The World's Second Gateway to China  
Protect Your Company Against Cybercrime - Featured Image

Protect Your Company Against Cybercrime

Cybercrime is on the rise. Companies, large and small, are falling victim to a fully weaponized web that provides bad actors with simple tools to perform their dirty cyberdeeds. Thanks to the Internet’s inherent anonymity, widespread reach, and disjointed law enforcement status Cybercriminals have a lot to gain – and enterprises have a lot to lose.
Cloud Security and Privacy for the Consumer & the Enterprise - Featured Image

Cloud Security and Privacy for the Consumer & the Enterprise

As part of the WTIA’s IT Security event series, they hosted a Privacy of the Cloud panel discussion at KPMG last week. Our very own Director of Cloud Strategy, Lee Pallat, was one of the panelists, along with Co-Founder of Déjà Vu Security, Akshay Aggarwal, Founder of Rhino Security Labs, Benjamin Caudill, and Manager at KPMG, Kerri Murphy. If you missed the event, you can read a recap on our blog, or watch the video. Interesting discussion about privacy and security related to the cloud and how it’s changing businesses, IT departments, and consumers.
The Best of 2014 - The Advisor - Featured Image

The Best of 2014 - The Advisor

We wanted to recap a few of the highlights from our blog, which included a fair amount of M&A activity, new cloud related technology products, and a bit of Shellshock.