cloudsecurity
97 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Elastica
Scoop.it!

Celebrity iCloud Accounts Hacked. Is the Sky Falling?

Celebrity iCloud Accounts Hacked. Is the Sky Falling? | cloudsecurity | Scoop.it
Breaches like hack on celebrity iCloud accounts often causes people to overreact. Zulfikar Ramzan, CTO of Elastica, puts this breach into perspective.
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Cloud Access Security Broker Gartner's #1 Technology for IT Security

Cloud Access Security Broker Gartner's #1 Technology for IT Security | cloudsecurity | Scoop.it
Cloud Access Security Broker (CASB) has been selected by Gartner as its #1 Technology for IT Security
Elastica's insight:

The Elastica team just returned from a fantastic trip to the 2014 Gartner Security and Risk Management Summit. The conference represented an incredible opportunity to talk with existing customers, engage new ones, and listen to numerous outstanding presentations on how the security technology market and threat landscape are trending. We’d like to think that the countless people who came by our booth didn’t just do so for an opportunity to win a Ducati Monster 696!

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Adaptive Security Architectures for Securing Third-Party Cloud Services (ASA for SAAS) - Elastica

Adaptive Security Architectures for Securing Third-Party Cloud Services (ASA for SAAS) - Elastica | cloudsecurity | Scoop.it
In February, Neil Macdonald (@nmacdona) and Peter Firstbrook (@pfirstbrook) of Gartner released a new research …
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Do You Need a Cloud Security Service?

Do You Need a Cloud Security Service? | cloudsecurity | Scoop.it
The modern enterprise faces a whole host of new threats thanks to BYOD, cloud computing, …
more...
Освіта України's curator insight, June 18, 2014 5:19 AM

Приєднуйтесь до мобільного управління навчанням. Українська освітня хмара

Scooped by Elastica
Scoop.it!

Cloud Computing Faces Rising Threats

Cloud Computing Faces Rising Threats | cloudsecurity | Scoop.it
The cloud computing security landscape is complex with its constant movement of data between devices, …
Elastica's insight:

The cloud computing security landscape is complex with its constant movement of data between devices, networks, and the cloud. The cloud provides great opportunities to attackers, results in shadow IT, and places an ever greater security burden on endpoints. Today, businesses use the cloud not just to host applications, but also to manage and analyze data.
As the cloud becomes increasingly popular with small and large businesses, ever more valuable and critical data is moved to it. Cloud security has been in the news over the last week with a new report out on it.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Google Glass Security Concerns

Google Glass Security Concerns | cloudsecurity | Scoop.it
Understand the scenarios where Google Glass security can be compromised.
Elastica's insight:

Recently, Google held a one-day sale of its much-anticipated Google Glass to the general public for the very first time. That said, the wearable computing device poses many privacy and security concerns, both at the individual level as well as at the enterprise level. In this post, I’ll explore the security concerns and suggest some remedial measures.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Cloud Security Perspectives on the Dropbox DMCA Takedown - Elastica

Cloud Security Perspectives on the Dropbox DMCA Takedown - Elastica | cloudsecurity | Scoop.it
Views on issues surrounding content protected by Digital Millennium Copyright Act or other potentially restricted content cut across different types of cloud services.
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Gartner Public Cloud Security Management Cycle (Part 1): Security Baseline - Elastica

Gartner Public Cloud Security Management Cycle (Part 1): Security Baseline - Elastica | cloudsecurity | Scoop.it
Managing cloud services requires baselining what your organization currently runs and understanding enterprise readiness from a security perspective.
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Rayid Ghani, former Chief Data Scientist Obama 2012 - Elastica

Rayid Ghani, former Chief Data Scientist Obama 2012 - Elastica | cloudsecurity | Scoop.it
Security has become the Data Science problem.  Elastica has the team to solve the Cloud …
Elastica's insight:

Security has become the Data Science problem.  Elastica has the team to solve the Cloud Security problem.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Security is fundamentally a Data Science Problem - Elastica

Security is fundamentally a Data Science Problem - Elastica | cloudsecurity | Scoop.it
Not long ago, digital assets within organizations could be secured largely by following simplistic sets …
Elastica's insight:

Not long ago, digital assets within organizations could be secured largely by following simplistic sets of human-derived procedures. The confluence of three key trends has made today’s picture more complex. First, the volume of information assets in organizations has grown exponentially. Second, IT infrastructures have become far more intricate, with a proliferation of new technologies and a more nebulous notion of the enterprise “perimeter”. Finally, threats themselves have become increasingly sophisticated and customized, driven by attackers who wish to capture a share of the seemingly limitless profits associated with compromising organizations.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Customized Security for the Customized Threat Landscape - Elastica

Customized Security for the Customized Threat Landscape - Elastica | cloudsecurity | Scoop.it
Not long ago, threats more-or-less conformed to a one-size-fits-all paradigm. Attackers would craft some nefarious …
Elastica's insight:

Not long ago, threats more-or-less conformed to a one-size-fits-all paradigm. Attackers would craft some nefarious piece of code, and then push it out to victims through a simple macro-distribution model. Nowadays, however, threats conform to a micro-distribution model. Rather than shipping small numbers of threats to large numbers of users, attackers have been shipping large numbers of threats each of which is targeted to a small numbers of users. This phenomenon transcends individual users and applies at the organizational level as well.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

The Three Main Cybersecurity Challenges Our Customers Face - Elastica

The Three Main Cybersecurity Challenges Our Customers Face - Elastica | cloudsecurity | Scoop.it
Despite varying in size and belonging to a wide range of industry verticals, Elastica’s customers …
Elastica's insight:

Despite varying in size and belonging to a wide range of industry verticals, Elastica’s customers share a set of common challenges when it comes to securing their information assets. This video describes what those challenges are and then describes how Elastica’s CloudSOC approach was designed to specifically to map to these challenges in a way that cuts across all of them concurrently.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Largest Data Breach of Health-Related Information

Largest Data Breach of Health-Related Information | cloudsecurity | Scoop.it
Zulfikar Ramzan, CTO of Elastica, discusses the largest data breach of  health information: 4.5 million patients' data exposed by Chinese hackers.
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Gartner's Number One Technology for Information Security

Gartner's Number One Technology for Information Security | cloudsecurity | Scoop.it
The Elastica team just returned from a fantastic trip to the 2014 Gartner Security and …
Elastica's insight:

The Elastica team just returned from a fantastic trip to the 2014 Gartner Security and Risk Management Summit. The conference represented an incredible opportunity to talk with existing customers, engage new ones, and listen to numerous outstanding presentations on how the security technology market and threat landscape are trending. We’d like to think that the countless people who came by our booth didn’t just do so for an opportunity to win a Ducati Monster 696!

more...
No comment yet.
Scooped by Elastica
Scoop.it!

The Case for Deep Visibility in File Sharing

The Case for Deep Visibility in File Sharing | cloudsecurity | Scoop.it
This past Wednesday,  the team at Elastica was excited to announce the availability of our …
more...
No comment yet.
Scooped by Elastica
Scoop.it!

CSA Metro Meet-up SlideShare - Elastica

CSA Metro Meet-up SlideShare - Elastica | cloudsecurity | Scoop.it
I had the pleasure of speaking recently at a meet-up of the Cloud Security Alliance …
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Security Challenges to SaaS Adoption

Security Challenges to SaaS Adoption | cloudsecurity | Scoop.it
Nowadays usage of SaaS applications is widespread among organizations, often from unsecured mobile devices. This …
Elastica's insight:

Nowadays usage of SaaS applications is widespread among organizations, often from unsecured mobile devices. This trend has reduced enterprise IT’s visibility and control of enterprise data, especially when accessed from unmanaged devices.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Heartbleed Flaw: Best Practices for End Users

Heartbleed Flaw: Best Practices for End Users | cloudsecurity | Scoop.it
The Heartbleed flaw has led to considerable concern among end users regarding what they need …
Elastica's insight:

The Heartbleed flaw has led to considerable concern among end users regarding what they need to do next. In this video, Elastica CTO Dr. Zulfikar Ramzan provides guidance on what end users need to do to best safeguard their data. The video touches upon checking site safety and gives basic guidance on how to pick good passwords.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Gartner Public Cloud Security Management Lifecycle (Part 3): Incident Detection - Elastica

Gartner Public Cloud Security Management Lifecycle (Part 3): Incident Detection - Elastica | cloudsecurity | Scoop.it
In my last two posts, I talked about the first two elements of Gartner’s Public …
more...
No comment yet.
Scooped by Elastica
Scoop.it!

Tom Reilly, former CEO ArcSight - Elastica

Tom Reilly, former CEO ArcSight - Elastica | cloudsecurity | Scoop.it
I am excited about Elastica’s vision for securing the cloud and bringing security operations center …
Elastica's insight:

"I am excited about Elastica’s vision for securing the cloud and bringing security operations center like capabilities, traditionally seen in the enterprise, to the cloud itself."

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Why CloudSOC? - Elastica

Why CloudSOC? - Elastica | cloudsecurity | Scoop.it
Is your data only within your company premises anymore? You may have deployed layers of …
Elastica's insight:

Is your data only within your company premises anymore?

more...
No comment yet.
Scooped by Elastica
Scoop.it!

The Big Three Cybersecurity Challenges Organizations Face Today - Elastica

The Big Three Cybersecurity Challenges Organizations Face Today - Elastica | cloudsecurity | Scoop.it
In the past year alone, I’ve talked with hundreds of information security professionals, from CIOs …
Elastica's insight:

In the past year alone, I’ve talked with hundreds of information security professionals, from CIOs and CISOs, to front line threat responders — across a range of industry verticals and company sizes. Despite the heterogeneous roles, responsibilities, and industries, there are three overarching cybersecurity challenges they all tackle.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Visibility and Control via Data Science - Elastica

Visibility and Control via Data Science - Elastica | cloudsecurity | Scoop.it
Data Science has been applied to a number of important problem domains. This video discusses, …
Elastica's insight:

Data Science has been applied to a number of important problem domains. This video discusses, at a very high level, why data science techniques are relevant in the context of cybersecurity, specifically in helping to mitigate the risks organizations face when employing SAAS applications and cloud services.

more...
No comment yet.
Scooped by Elastica
Scoop.it!

Councils 'wasting millions' ignoring government IT cloud - BBC News

Councils 'wasting millions' ignoring government IT cloud - BBC News | cloudsecurity | Scoop.it
BBC News Councils 'wasting millions' ignoring government IT cloud BBC News In the 2012-13 financial year, county councils spent nearly £440m in total on IT services, including staffing costs, but just £385,000 of that through the government's...
more...
No comment yet.