These complimentary educational sessions are designed to be a highly interactive, and bring together industry practitioners from the National Cyber Security Alliance, Cloud Security Alliance and industry partners to help you combat the cyber underworld.
HyTrust Appliance 3.5 now provides a unique level of visibility into the operation by monitoring, logging, and evaluating every administrative action initiated by every user to detect suspicious activity as it occurs.
Trend Micro has teamed up with VMware to integrate Trend Micro's Deep Security with VMware’s NSX platform, giving joint customers a security solution that automates security deployments in virtualized data centers.
By including security into the DevOps model, organizations can attain that improved agility and operational excellence while also improving the necessary checks and balances before changes are pushed into production.
Securing a hybrid cloud environment may be different from your traditional private cloud infrastructure. The security challenges include a dependency on networks that are outside your immediate control and may be accessed outside of the normal corporate access methods.
As the use of Secure Shell (SSH) keys and related encryption services evolves and expands, security experts question what drives that evolution and are looking for ways to maximize the security effectiveness of the ubiquitous technology.
In the era of the public cloud, when employees are frequently using consumerized applications to share and store data, it's time for security and risk professionals to adopt a new security thought paradigm that focuses on the insider threat that employees create, not solely on protecting data itself.
Before cloud, IT had a monopoly; if someone wanted to do something and it involved computers, IT had to be engaged. This is no longer the case. Instead of bring your own device, public cloud can be described as bring your own server.