Cloud Security: An Ongoing Risk Mitigation Process

Cloud Security: An Ongoing Risk Mitigation Process

Cloud Security must remain the top objective when organizations consider moving their data over to a cloud computing platform.  While cloud computing offers businesses many benefits, an organization choosing to place its intellectual property along with its customer information and corresponding emails into a cloud computing environment will also have to come to the realization […]

Cloud Security must remain the top objective when organizations consider moving their data over to a cloud computing platform.  While cloud computing offers businesses many benefits, an organization choosing to place its intellectual property along with its customer...
Information Security Remains a Risky Business

Information Security Remains a Risky Business

It’s been a common information security event in the news for all too many business enterprises —- e.g. yet another large publicly traded company is the recent victim of a data breach. The situation is worsened, when not only business information is breached but also millions of customer’s personal and financial information records are compromised. […]

It’s been a common information security event in the news for all too many business enterprises —- e.g. yet another large publicly traded company is the recent victim of a data breach. The situation is worsened, when not only business information is breached but...
Can Effective Information Security Controls Maintain Organizational Resilience?

Can Effective Information Security Controls Maintain Organizational Resilience?

Effective information security controls are a good defense against cyber threats. However, will that be enough to keep the doors of your company open for business over the long term? Hiring a capable and effective information security analyst staff, or increasing your budget to expand information security jobs in your organization may prove your upper […]

Effective information security controls are a good defense against cyber threats. However, will that be enough to keep the doors of your company open for business over the long term? Hiring a capable and effective information security analyst staff, or increasing your...

Risk Management Analysis Needed When Deciding Use of Cloud Services

There was a time when risk management teams were focused on the question, “Should our organization risk migrating applications and data to the cloud?”  But today that question has changed.  Because so many enterprises today have shifted their applications and data to the cloud, organizational risk management team members now potentially face serious security risk […]

There was a time when risk management teams were focused on the question, “Should our organization risk migrating applications and data to the cloud?”  But today that question has changed.  Because so many enterprises today have shifted their applications and data to...
Study Finds Security Experts and Non Security Experts Differ in Approach

Study Finds Security Experts and Non Security Experts Differ in Approach

Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe online. Given that you can find more online security tips in a few seconds than […]

Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe...

Pin It on Pinterest