Welcome to the holiday season! Along with the holiday cheer, parties, presents and spending come some risks of which we should all be aware. Situational Awareness is a phrase that some might not recognize. Situational Awareness entails being aware of your surroundings and environment and adapting your behaviors to address the risks being presented.
Archive for the 'Security' Category
Page 3 of 3
Everyone knows that a lot of information about each of us is floating around various segments of the internet. The prevalence of online shopping, social media and portable computing has made us comfortable with this and in many ways that is a good thing for commerce, society and individuals. Many of us feel very confident in the controls that exist to protect data about us and in most cases that confidence is well founded.
Continue reading ‘How Much is Your Data Worth?’
Recognition of information security responsibility is reducing costs of breaches.
From time to time I look over the Ponemon Institute reports related to data breach costs to get a feel for the business value of securing data. After reading the most recent Ponemon Institute report, I want to talk about the interesting executive summary highlights.
Earlier this month, I attended ConSec ’12 Consumerization of IT – Are You Keeping Pace? in Austin, TX. This year marks the tenth bi-annual gathering and it was a three-day event that offered attendees a choice of one of four optional workshops followed by two full days of sessions in three tracks. This regional conference targets attendees from Texas and the four surrounding states. Vendors were clearly visible in the exhibit area. The uniqueness that helps contribute to the continuing success of this conference is the hosting. Volunteers from four organizations act as planners, schedulers, marketers, logistics experts and hosts.
Continue reading ‘ConSec ’12 Recap’
Despite increasing adoption in cloud computing, many companies are still hesitant about making the leap to the cloud due to concerns about security. In fact, a recent cloud computing survey revealed that security and compliance are the top inhibitors for cloud adoption.
I attended the ISACA Silicon Valley chapter 2012 Summer Conference, Enabling Trust: Business in the Cloud, on August 23rd and 24th. Some of the organizations presenting included Qualys, SurveyMonkey, EMC Consulting, StrongAuth, Allgress, PwC, Apollo Group, iStreet Solutions, Check Point Software Technologies and Layered Tech.
We will be announcing a next generation secure cloud platform shortly. I want to give you some insight of our thoughts around cloud and security.
Customers are often faced with choosing between greater business agility or highly secure and compliant-ready environments. We do not think this is a fair trade-off. No customer should be forced to forgo the full promise of cloud to achieve running in a secure and compliant environment. Nor should a client need to sort through piles of log data to keep themselves compliant when outsourcing to a cloud service provider. We are addressing this very quandary.
By Jeff Reich, Chief Risk Officer, Layered Tech
It seems almost daily a new report emerges detailing how a company suffered a data security breach, resulting in the release of sensitive data for hundreds of people. To help guard against these attacks, companies can become PCI compliant, but it is not an easy goal to achieve and does not guarantee complete and total security. As an alternative, community clouds provided through third-party resources like Layered Tech offer security options and a path to compliance without the cost and labor issues present with in-house systems.