BYOD Done Right: Why Access Management Is Vital To Your Mobility Strategy

When it comes to desktop security, most companies still struggle with the notion that a good piece of antivirus software and a firewall just aren’t enough to prevent many threats from falling through the cracks. It’s no surprise that a very large number of companies have an even greater struggle figuring out how mobile devices fit into the mess. The whole “bring your own device” (BYOD) trend that has been hitting corporate infrastructures for years, despite its benefits, has created an enormous gap that IT staff all over the world are losing their hair over.

Continue reading “BYOD Done Right: Why Access Management Is Vital To Your Mobility Strategy”

eBay’s Big “Whoops”: What Others Can Learn From This

by Sabi

The word “eBay” necessitates no introduction. It’s a household brand, and a very successful one at that. The company made $16 million in gross revenue in 2013, netting at about $2.8 million. The growing entrepreneurial company has made significant strides in ensuring that the buyers and sellers operating on it have the best trading experience and dispute resolution system possible. In short, this company’s a well-oiled machine. Recent news, however, is showing us that for all of eBay’s strengths, it had one critical weakness: Its security practices and infrastructure. And this cost the company dearly in the past week.

Continue reading “eBay’s Big “Whoops”: What Others Can Learn From This”

The 5 Most Basic Principles of Cloud Security

If you’re out and about, venturing on the cloud, surfing the net, and checking your email, you’re going to be hunted at one point or another. The best way to disappoint the hunter is to be as prepared as possible. This means knowing how to protect yourself against even the most perilous of threats. The cloud has been a hacker’s new target for some time now, and many of the startups behind cloud applications have left some holes in their software that could spell doom for you. In response to this, there’s the art of cloud-fu, and we’re going to teach you its most basic principles.

Continue reading “The 5 Most Basic Principles of Cloud Security”

The “Heartbleed” Madness Was Just One Battle – We’re Fighting a War

On April 7, 2014, the internet was in peril after discovering that the one thing they relied upon the most for encrypting HTTP transactions – OpenSSL – was vulnerable to attacks that would reveal passwords for a good two years. After causing quite a stir, the waters eventually calmed and everything went back to business as usual. Now, it is as if though nothing really happened.

Continue reading “The “Heartbleed” Madness Was Just One Battle – We’re Fighting a War”

Cloud Security Is In Decline – What Are Your Options?

Have you ever felt that awful feeling that the ship you’re on is slowly and steadily sinking, and no one’s telling you a thing about it? If you are in the cloud, then you should know the feeling, because while your captain is reassuring you that everything is A-OK, new holes start appearing in every new version of the product every day, allowing more water to seep in above the keel.

Continue reading “Cloud Security Is In Decline – What Are Your Options?”