Quantcast
Channel: Computerworld Steve Pate
Browsing latest articles
Browse All 15 View Live

PCI forecast: Cloudy, with a chance of compliance

When IT teams start talking Infrastructure as a Service, I expect corporate compliance officers hear virtual alarm klaxons, along with the not-so-friendly warning, "Sir, step away from the cloud."  We...

View Article



Virtualization security 101: A user's primer

While the virtues (and pitfalls) of the cloud have been exhaustively documented, the fact remains that it's highly likely that the servers that house your applications and data are virtualized,...

View Article

Banking on the public cloud

What do banks and the public cloud have in common? More than you might think. Let’s use the concept of banking as we jump into the root of the public cloud debate. Do you remember when you were a kid...

View Article

Data privacy and PRISM: When politics and technology collide

If you are both a news and a cloud junky as I am, there has never been a more interesting -- or distracting -- time to hit refresh on your favorite online news site. The recent statements by...

View Article

Will FISMA, FedRAMP impact cloud security?

I can usually tell when a regulation has teeth when I start to hear multiple customers asking about it. Interestingly, the Federal Information Security Amendments Act of 2013, also known as HR 1163,...

View Article


Secure migration to the cloud: A not impossible mission

Cloud security is not just a popular topic these days, it could be the storyline for the next Tom Cruise movie. In just a few months, we’ve seen disclosures by a whistle-blowing former NSA spy, user...

View Article

HIPAA compliance in the cloud

Remember how when you were a kid, and you went to spend the night at a friend’s house, you were faced with all kinds of new and different ‘rules of the house’? Maybe your friend’s parents made you eat...

View Article

Regardless of the NSA, you still need encryption

It seems as though everywhere you turn lately, another story breaks revealing information about PRISM and Edward Snowden. And it just keeps coming. Snowden’s latest disclosure builds on the story that...

View Article


Going to the cloud? BYOS (bring your own security)

There are many benefits to be gained by using the public cloud. Cost efficiencies, elasticity and collaborative access are mentioned most often. But will your data be secure in the cloud? And who is...

View Article


Why a secure, multi-vendor strategy is crucial for the cloud

A few weeks ago, one of the well-regarded vendors of the cloud storage world, Nirvanix, abruptly announced that it was closing its doors, giving its more than 1000 customers just two weeks to migrate...

View Article

Image may be NSFW.
Clik here to view.

When insiders become outsiders (and other cloud security challenges)

If you've ever been an IT hiring manager, you know the scrutiny that goes into the interview process as you seek to bring trustworthy and effective talent into your organization. (Also, it's a bonus...

View Article

Image may be NSFW.
Clik here to view.

Virtualized environments. Real risk.

Unfortunately, it's not always this obvious when your privileged user accounts or data have been hacked. New reports from security investigators are estimating that the recent Adobe breach may in fact...

View Article

Image may be NSFW.
Clik here to view.

3 reasons perimeter security is not enough for the cloud

The “M & M” model of data security (hard shell, soft inside) has been the standard for most enterprises for decades, based on a number of assumptions:  All our mission-critical and Tier 1...

View Article


How the NSA is preventing another Snowden (and why you should do the same)

On December 11th, the director of the National Security Agency (NSA), Gen. Keith Alexander, stood before the Senate Judiciary Committee to discuss actions being taken in the wake of Edward Snowden’s...

View Article

The modern face of cyberthreats (Updated)

Editor's note: This post was updated after publication to remove references to discarded reports related to the Target breach. A multimillion-dollar security infrastructure, built and maintained by...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images