Security Measures that Build Trust
This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.
Posted by: Jeffrey Johnson on January 30th, 2015
It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.
Posted by: Premkrishnan Venkatasubramanian on November 14th, 2014
For the fifth and final week of National Cyber Security Awareness Month, we look at 4 tips for organizations to combat cybercrime.
Posted by: Roberto Tavano on October 30th, 2014
The primary objectives of identity and access governance are to manage risk and ensure compliance in a consistent, efficient and effective manner. Access governance is about implementing well-described processes, procedures, and guidelines.
Posted by: Charles Ugalde on October 27th, 2014
For week four of National Cyber Security Awareness Month, we look at 5 key security considerations for small and medium-sized companies in 2015.
Posted by: Francis Ofungwu on October 23rd, 2014
For week three of National Cyber Security Awareness Month, we're providing three tips for critical infrastructure protection.
Posted by: Stephen McCarney on October 15th, 2014
This week we’re continuing our series of tips aligned with the National Cyber Security Awareness Month campaign by looking at the secure development of IT products.
Posted by: Charles Ugalde on October 9th, 2014
With National Cyber Security Awareness Month kicking off this month, we’d like to share a series of tips aligned with each of the various focus areas of the campaign. This week we’ll cover tips for online safety for consumers.
Posted by: Nick Evans on October 2nd, 2014
Discover three key activities that need to be accomplished for an effective sensitive data protection strategy.
Posted by: Francis Ofungwu on September 4th, 2014
A recent survey reveals 78 percent of respondents believe that a successful attack on their SCADA/ICS systems is at least somewhat likely within the next 24 months. Find out several things these organizations can do to improve the situation without giving up all the cost savings.
Posted by: Dave Frymier on August 19th, 2014