The University of Tampa Plans to Bridge the Cybersecurity Workforce Gap November 25, 2015 - 11:51 AM The growing global IT security workforce shortage is no secret. As detailed in (ISC)²'s 2015 (ISC)2 Global Information Security Workforce Study-conducted by Frost & Sullivan and sponsored by Booz Allen Hamilton, NRI Secure and Cyber 360-we are looking at a 1.5 million shortfall of trained and certified security professionals by 2019. A key means for closing this gap is the (ISC)² Global Academic Program (GAP) from our community host which recently welcomed The University of Tampa as a new program member.
How Contact Centers Can Survive the Holiday Rush November 24, 2015 - 11:32 AM With the high shopping season around the corner, company call centers are bracing themselves for the deluge of traffic in the lead up to the end of the year and the world's busiest shopping period.
5 Ways to Secure the Public Cloud November 24, 2015 - 10:43 AM As cloud computing becomes more sophisticated and mainstream, the shift to the public cloud is gaining tremendous traction. With big-brand clouds (Amazon Web Services, Google Cloud Platform and Microsoft Azure) fast evolving, more and more enterprises are moving away from private clouds. However security is justifiably a top concern when moving applications and data into the public cloud. Some of the questions foremost on everyone's mind are - How secure is my data? What will happen is there is a breach with the public cloud vendor? How do I ensure that my data is properly protected in this case?
Study: Fed Suffers from Legacy Apps that are Hard to Modernize November 24, 2015 - 9:59 AM Federal agency IT managers understand that their legacy systems are ticking time bombs, according to a new study conducted by MeriTalk and sponsored by Accenture Federal Services, but most are struggling to actually fix the problem.
Winning the War for Payment Card Data: The Trifecta of EMV, P2PE, and Tokenization November 23, 2015 - 10:34 AM Last year, the United States experienced what has been dubbed "the year of the data breach." Now, we're nearing the end of 2015, and data breaches continue to plague merchants. Some are saying that hackers' tactics are changing and that remote-access attacks are a new frontier in the fight for payment card data. But, these kinds of attacks aren't new - what's changed is the hackers' strategy.
Sisense Version 6 Opens Up Business Analytics to More Users November 19, 2015 - 3:38 PM Using business analytics tools can revolutionize the way business operates overall. It can allow certain trends to be more readily spotted and taken advantage of, improving business performance and key bottom-line metrics. Actually using these tools, however, can seem daunting to some. That's a development Sisense wants to fix with its newest version.
Cyber Attacks Growing More Dangerous for Individuals and Businesses November 18, 2015 - 1:51 PM Cyber attacks are becoming more impactful with a broader set of repercussions, according to new data from Trend Micro. The company has released its Q3 Security Roundup Report, finding that data breaches and other attacks are having a bigger impact on enterprise earnings as well as the physical safety and privacy of individuals.
Avanan Makes Enterprise Security Solutions Work in the Cloud November 18, 2015 - 1:33 PM Avanan made a global splash today, exiting stealth mode with a one-click solution for applying advanced security technologies to cloud and SaaS applications and data. The new company, which is based in New York City with research and development in Israel, aims to make legacy enterprise security solutions available for easy deployment in the cloud.
Fighting the Next War: Military Cybersecurity Spending on the Rise November 18, 2015 - 11:38 AM We're all actively fighting a war online, whether we know it or not. Criminals go after our personal information, our infrastructure, and our deepest secrets. It's a war that various portions of the military are taking more seriously, as spending on cybersecurity globally is expected to reach $10 billion in 2015.
Cylance to Protect Dell's New Endpoint Security Suite November 18, 2015 - 10:29 AM The way in which antivirus solutions try to stop malware is coming under great scrutiny. Cyclane, a security provider, has been implementing solutions to address those security concerns, which might explain Dell's decision to go with the company to protect the new Dell Endpoint Security Suite (ESS).
Varonis Enables Regulatory Compliance for Rabobank November 17, 2015 - 4:20 PM The international banking industry must abide by a number of regulations implemented in the wake of the financial crisis of 2007/2008. Varonis Systems is helping Rabobank, a Dutch multinational, address these new regulatory compliances with a solution that allows it to control its data access and permissions.
DDI Leader Infoblox Explains Security Challenges & Discusses Company Growth November 17, 2015 - 4:17 PM The DNS protocol was created more than 20 years ago to enable computers to more easily connect to one another. But no one at the time thought DNS would be used to connect so many things, so security was not a major consideration at that point. But now the use of DNS is widespread, and we're beginning to understand why implementing DNS security is important.
What Lurks in the Shadows: Advanced Cyber Attacks that Hide in SSL Traffic November 17, 2015 - 4:08 PM From Target (News - Alert) to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but these solutions face an unexpected adversary: SSL encryption.
SafeLogic Helps Vendors Move Faster November 16, 2015 - 2:27 PM Companies that offer security solutions can get to market faster by leveraging technology from SafeLogic, the company's CEO Ray Potter told me in an interview last week at TMC Editor's Day Silicon Valley.
Vidder Talks About the Challenges & Solutions for Enterprise Security November 16, 2015 - 2:13 PM When Vidder launched for business in 2009 as a consulting company that built secure networks for companies, many businesses thought its solutions were far more secure than was actually necessary. Today Vidder offers a software-defined perimeter service called PrecisionAccess, which is used to protect assets with a book value of $1 billion or more, and Fortune 500 customers clearly understand the need for this kind of security.
Integra Deploys Splunk Security Solutions November 16, 2015 - 1:15 PM Integra, a company providing the western U.S. with a wide range of networking, communications and technology solutions, recently announced that it has expanded its security operations center (SOC) by implementing Splunk Enterprise and Splunk Enterprise Security (ES).
Evident.io Brings Scalable Security to DevOps Teams Using AWS November 16, 2015 - 11:33 AM Tim Prendergast describes himself and Evident.io co-founder Justin Lundy as former punk renegade kids. CEO Prendergast said he grew up in IT and went on to lead technology teams at Adobe, Ingenuity, Ticketmaster, and McAffee. CTO Lundy also worked at Adobe and has spent time defending the castle, as his bio says, at CA, MTV/Viacom, and CA.
Altiscale: The Big Data Utility November 13, 2015 - 2:49 PM Macaig illustrated that Spark is a big piece to this startup's success. He explained, "It puts a sharp point on what we do." Altiscale runs the three most recent versions of Sparks simultaneously, as to not force customers to worry about interoperability.
Gigya: Identity is Critical to the Customer Journey November 13, 2015 - 12:22 PM These three words succinctly explain what Gigya brings to the table for some of the largest consumer-facing companies in the world, explained CEO Patrick Salyer in an interview with me earlier this week at TMC Editor's Day Silicon Valley.
86 Percent of VP and C-Level IT Leaders Fear a Breach in the Next Year November 13, 2015 - 9:19 AM According to a report from Markets and Markets, the cyber security market is estimated to grow to $155.74 billion by 2019 at a CAGR of 10.3 percent from 2014 to 2019. Even with all that growth, a new survey just released by Promisec survey reveals there is still great concern from the majority of VP and C-Level IT leaders regarding the threat landscape in the digital space.
ServiceNow's Service Management Makes Better Use of IT Resources November 12, 2015 - 2:08 PM While the IT staff's purview in the past was largely relegated to tasks such as fixing fellow employees' computers and maintaining internal systems, now IT types are charged with helping fix the business. At least that's how Dave Stephens, vice president and general manager of service management at ServiceNow, sees it.
U.S. Leads in Service Management Uptake Beyond IT November 12, 2015 - 1:26 PM U.S. firms are leading the charge when it comes to applying service management suites-software that optimizes operational flow-outside of the classic IT domain. In fact, research has revealed that more than 75 percent of organizations in the U.S. are now using service management for optimized service delivery in at least one department outside IT.
Don't Be a Sitting Duck - Learn How to Monitor Security Threats on Your Network November 11, 2015 - 10:11 AM The Internet is a wonderful thing, but not without its problems. We love being instantly connected to find the products we want, connect with those who deliver value, access information and stream entertainment. Unfortunately, to have this kind of access also means we're exposed to threats.
Wheelings & Dealings: Cybric Rakes in $1.3 Million November 11, 2015 - 10:10 AM Security virtualization and threat vulnerability remediation specialist Cybric has received $1.3 million in seed funding. The infusion will be used to speed up research and product development of the company's continuous security delivery fabric, which offers a unified view of enterprises' entire security infrastructure.
Centrify's Enterprise Identity Management Makes Work Easier, More Secure November 11, 2015 - 9:59 AM Centrify also earlier this month announced integration partnerships with cloud access security brokers CloudLock, Elastica, Imperva, Netskope, and Skyhigh Networks. Mann explained that while Centrify offers control and visibility into what's happening around attaining access to an application, these new partners address what happens once the user is inside the application.
Cryptzone Releases New Module for Security Sheriff November 11, 2015 - 8:25 AM Cryptzone, a developer of security software for Web development applications, recently announced that it has added a new module to its Security Sheriff software. The Site Module leverages the Microsoft Retail Management System (RMS) to allow users to share sensitive Microsoft SharePoint 2010 and 2013 data.
San Francisco Public Defender's Office Adopts NAKIVO VM November 10, 2015 - 3:53 PM The San Francisco Public Defender's Office has worked to defend San Francisco citizens in court for more than 90 years. To conquer the headaches associated with its previous virtual machine (VM) backup system, it recently adopted the NAKIVO Backup and Replication software that intends to act more properly in protecting the office's VMware environment.
What Companies Must Leave Behind to Migrate to the Cloud November 10, 2015 - 10:51 AM Moving business operations and processes to the cloud is never an easy task. There are always unclear steps, including the due diligence to vet solution providers, clearly identifying needs and ensuring the right tools are in place to protect the network and its users. The benefits are clear and measurable, as long as you have a proven path to get there.
Nigeria: A New Major Target for Cybercrime November 9, 2015 - 4:00 PM Kaspersky Lab recently released new information via its Kaspersky Security Network (KSN). The research shows that Internet users in Nigeria need to beef up their cybersecurity practices. Cybercrime is on the rise in the region, and threatens users on several different levels.
Disaster Recovery - Critical to the 'Always-On' Business! November 9, 2015 - 3:22 PM In the age of the 'Always-On' business, companies are facing new demands from end users including 24/7 access to data and applications and whom have no patience for downtime or data loss, all this while grappling with an exponential data growth of 30-50% per year.
To cope with these demands, many companies today are building modern datacenters and investing in server virtualization, modern storage applications and cloud-based services, in pursuit of higher speeds, more efficient use of existing resources and possible cost savings.
Business Compliance Headaches? iland Can Help November 6, 2015 - 10:19 AM When trying to make your business code-compliant, it can be very difficult to bring all the disparate sources within an organization together. The new holistic cloud security from iland intends to fix that. It's equipped with a unified compliance engine along with a robust security protocol to ensure its customers are abiding by the regulations that are in place.
Data Breaches Approach Coin Flip Levels November 5, 2015 - 12:49 PM Stories of data breaches seem to come out on a regular basis these days, from Ashley Madison to Home Depot and a host of others in between. A new study from IID conducted by the Ponemon Institute shows that this trend is on the rise, and as a result, 47 percent of companies and government organizations have been breached in the last two years.
What You Need to Know About the New Cybersecurity Bill November 3, 2015 - 5:27 PM A cybersecurity bill is making the rounds that will supposedly put measures in place to help better protect people from hackers and unscrupulous individuals. The bill, called the Cybersecurity Information Sharing Act, passed through the Senate with a 74 to 21 vote in favor. Before President Barack Obama can sign it - and make it a law - it needs to be merged with another bill passed earlier by the House of Representatives that's similar, and then the new proposition must be voted on again.
The Offsite Connection: Remote IT Support November 3, 2015 - 3:55 PM Resolving tickets on the helpdesk quickly and efficiently, without interrupting either the support professional or end user, is crucial to meeting service levels and maintaining a good relationship with your workforce. Remember-IT should be anytime, anywhere.
Financial Models for Engaging a Product Development Partner October 30, 2015 - 9:12 AM There are many different financial models under which clients of product development consulting firms choose to engage. Start-up and early stage companies are often looking for flexibility in how they engage with a PD partner, and they often seek alternate ways to help stretch their dollars further. Even in the case of larger companies, our firm has recently started seeing non-traditional approaches to funding development. Here are some examples.
Infoblox Defends the DNS of Service Providers October 29, 2015 - 4:02 PM As one of the gateways for distributed denial of service (DDoS) attacks, it is extremely important to protect the Domain Name System (DNS). The new improvements Infoblox has made to its 4030 series appliance can block different types of threats to defend the DNS of service providers from possible DDoS attacks.
Consumers: The Cloud Looks Darker Than We Expected October 29, 2015 - 2:38 PM While there's plenty of word about the positive aspects of the cloud, there's also a growing body of concern about this radical new tech. A new study from Radware shows that, for many consumers, the cloud is looking more ominous than friendly, and some real concerns are afoot.
Balancing Security and Mobility in the Age of the Data Breach October 28, 2015 - 2:11 PM A Dilbert strip featuring Mordac, the Preventer of Information Services, once declared that "In a perfect world, no one would be able to use anything." How do businesses balance their security measures against employee convenience?
How to Hire UI Designers October 28, 2015 - 10:18 AM When you're not familiar with the world of digital marketing and mobile media platforms, the challenge of getting your company's name out there becomes that much more daunting. That's why one of your first steps should be to hire a professional UI designer.
Five Steps to Developing CD Pipelines October 27, 2015 - 1:34 PM When teams set up pipelines in continuous delivery, they all approach the challenge with the same goals. But how do they achieve those goals? What are some common pitfalls that they need to avoid?
Cybersecurity: Why CXOs Need to Play the Infinite Game October 27, 2015 - 8:55 AM While it might be easy for executives with non-technical backgrounds to simply assign responsibility for cybersecurity to the CSO, CISO or IT team, this would be a mistake. CXOs might see the iceberg ahead, but do they really understand the size of the problem below the surface?
Best Practices for Controlling Third-Party Access October 23, 2015 - 8:55 AM Who has access to your critical enterprise assets? This has become one of the most important questions in cybersecurity today. Learn how to control that access with SSH Communications Security's Matthew McKenna.
Transera's Call Center App Necessary for North Texas Specialty Physicians October 22, 2015 - 11:40 AM With healthcare costs rising across the board, and ways to reduce those costs high in many minds, the thought of putting the cloud contact center to use is gaining plenty of traction with firms. Transera recently announced that North Texas Specialty Physicians (NTSP) was looking to go that route, bringing in the Call Center App for Salesforce as a way to help drive service and possibly lower costs with it.
Adaptiva Releases Version 5.5 of OneSite with Upgrades to SCCM Enterprise October 22, 2015 - 11:33 AM Microsoft's System Center Configuration Manager (SCCM) can now manage large groups of computers running a wide range of operating systems. The new upgrades on the Adaptiva OneSite 5.5 will introduce more functionality to SCCM with greater visibility, transparency, control, scalability and automation.
Study: Enterprise Applications Face Major Security Lapses October 22, 2015 - 11:13 AM The security threat landscape in the connected world is getting more dangerous for consumers and enterprises alike. An independent study conducted by King Research revealed 60 percent of organizations don't require non-employee multifactor authentication to access enterprise applications.
Trend Micro to Buy HP TippingPoint in $300 Million Deal October 21, 2015 - 6:15 PM Security software powerhouse Trend Micro International is expanding its range of offerings and eliminating a key competitor with the acquisition of HP TippingPoint. The company announced a definitive agreement to purchase the HP company, which specializes in next-gen intrusion prevention systems (NGIPS) and network security, for $300 million.
Report Shows Consumers Want Businesses to Increase Online Security October 20, 2015 - 3:56 PM A recent study shows that customers are extremely interested in what retailers are doing in order to protect their financial information. The report, issued by the American Banker's Association (ABA) found that an overwhelming majority of people think retailers should be going the extra mile to protect consumer data from hackers.
New Research Shows Enterprises Falling Short on Data Control October 20, 2015 - 10:33 AM Big data and virtualization technologies continue to grow exponentially as companies scramble to implement cost effective and efficient ways to deal with increasing amounts of data. That trend was reflected in recent research from IDC, as commissioned by copy data virtualization specialist Actifio.
Verizon Expanding Secure Cloud Service into Latin America October 20, 2015 - 9:51 AM Verizon's secure cloud solution has been growing by leaps and bounds over the last few months. Now the company says that it is going to be expanding the service and deepening its global footprint with an expansion into Latin America.
Verismic Offers Power Manager to Help the Environment October 19, 2015 - 1:57 PM One of the primary benefits of CMS is its cloud-based nature. By working entirely in remote servers, clients can avoid conflicts with their own software and hardware they use or any third-party programs they may utilize on a daily basis. Clients can use any Web browser to enter the CMS interface and gain a complete look at their entire IT systems and associated energy usage.
Centrify Becomes Newest Member of Cloud Security Alliance October 19, 2015 - 9:19 AM Centrify, the developer of identify theft protection software Centrify Identity Platform, recently announced that it has become the CSA's newest member. That security platform helps secure enterprise data by scanning on-premise, cloud-based, and mobile applications and networks for signs of a breach. It authenticates users through a single sign-on, multi-factor process in order to vet all users and actions that could take place on any network.
To UTM Tag or Not UTM Tag, That is The Question October 16, 2015 - 9:57 AM Even in the analytics industry, there is very little discussion or understanding around why or how UTM tagged links influence data in Analytics, which is unfortunate because UTM tags have a significant influence on the two most essential variables for every pageview: source and medium.
IT Budget Challenges in the United States Worst on the Planet October 15, 2015 - 10:45 AM On a certain level, it's not a surprise that the United States would have some serious difficulties when it comes to information technology (IT) budgets. It's home of some of the largest corporations on Earth, and a host of small businesses that all face cybersecurity challenges in a rapidly changing environment. But the new report from Axios Systems suggests that the budgets to meet those challenges won't be growing much in the United States as compared to the rest of the world.
Dear Fingerprint Scanner, We Could Be Really Great Together October 14, 2015 - 3:00 PM Even if humans made more complex passwords, even if websites stopped storing us in plain text, and even if encryption became widespread, we'd still be in trouble. The truth is, Fingerprint Scanner, you are one sexy animal analyzer. For most of those humans, pressing a thumb on you is the closest they will ever get to being a secret agent.
DevOps Early Adopters Say Open Source and PaaS are Key October 8, 2015 - 11:34 AM With DevOps approaches being used to create and run software across an increasingly broad spectrum of organizations, we're now at the point where we can gain quantitative insights from early adopters about DevOps adoption that go beyond a handful of oft-referenced Web-scale anecdotes.
Skyworks Acquires PMC Sierra in $2 Billion Deal October 7, 2015 - 3:12 PM Skyworks announced recently that it would purchase PMC Sierra in a deal totaling $2 billion. The transaction allows Skyworks to diversify its customer base as the semiconductor industry grows more competitive.
TechnologyAdvice Offers Tech Insight Ahead of ITEXPO October 6, 2015 - 4:55 PM TechnologyAdvice, a popular b2b technology research/review service, provides intel on a wildly diverse set of industries. While our readers will doubtlessly appreciate their VoIP, Cloud Storage, and CRM knowledge, the company also reviews gamification, HR, accounting, and project management software (among others).
Best Practices for Building Trust in Cyberspace October 6, 2015 - 8:48 AM In an increasingly hostile and volatile cyber landscape, trust is a vital yet sometimes elusive component of business. Establishing trust is easier said than done, and it's not getting any easier. Guest writer John Grimm, Senior Director at Thales e-Security, explains the best ways to build consumer trust in the digital marketplace.
GTISC: Cybersecurity Top Priority for Growing Number of Firms October 5, 2015 - 1:55 PM These days, it seems like cybersecurity is front and center for a lot of people. A new study from the Georgia Tech Information Security Center (GTISC) reveals that it doesn't just seem that way to the outside viewer: cybersecurity really is a big concern for many out there.
Six Things Your IT Support Might Be Missing October 5, 2015 - 9:11 AM Do you know what your IT initiatives are or what your IT support is working on? If you know the answer, great! You are among the few business owners who do. If you are not, here are six talking points to discuss with your IT support and how they can help your business.
AppliedMicro, Vapor IO Get Together For Telemetry Advancements October 1, 2015 - 5:37 PM Data centers are not easy things to manage. With an ever-increasing amount of data flowing through the system, which in turn needs to be regulated to make sure it all gets where it's going without an unnecessary bottleneck or the like. Certain tools, meanwhile, can make this process easier-though never really easy-to handle, and one such advance recently came out as a result of a new partnership between AppliedMicro Circuits Corporation and Vapor IO.
The xPaaS Revolution and the Rise of BizDevOps September 29, 2015 - 5:25 PM Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.
Mind the Gap: Eluding the ITSM Slippery Slope September 29, 2015 - 5:11 PM Administering ITSM comes with some slippery rabbit holes, and is much like the famous Alice in Wonderland quote: "If you don't know where you are going any road can take you there." We've heard a lot about the gaps between ITAM (IT Asset Management) and ITSM (IT Service Management), the gaps between ITIL and ITSM, and more recently the gaps between ITSM and ITSSM, and even the more nuanced maturation levels of your ITSM. Without timely and relevant data, your processes, people, governance, and your entire IT vision all become manipulated and bent in imprecise manners, yielding your ITSM ineffectual.
the xPaaS Revolution and the Rise of BizDevOps September 29, 2015 - 10:32 AM Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.
Keep it Simple: Why Simplicity Leads to Enterprise Success September 29, 2015 - 9:19 AM The modern workplace - specifically the enterprise - can be stressful. Overflowing email inboxes, numerous tasks and projects with tight deadlines, and too many enterprise systems with too many buttons and too many features. As if that weren't enough, complex business processes also exist with multiple stakeholders that need to be managed. The information systems that once promised to help us soon became so complicated that nobody knows how to use them properly. The enterprise reality is that employees spend too much time organizing their work and trying to simplify so they can understand what they need to do, how to do it and when to do it instead of doing actual work.
How VPS Hosting is a Cheap Alternative for Enterprise September 24, 2015 - 11:13 AM Since the origin of online business management, people have been comparing different resources of data management and security. There have been debates about using Virtual Private Server and how it serves better or lesser than other web hosting services. The cheapest VPS services are available from $18 but if you want better and more professional services, then you need to take out a few hundred dollars from your wallet only. But does that make VPS an economic solution for your online business?
Design for Manufacturing (DFM) Thinking in Advanced Development: Inject DFM Early and Often September 22, 2015 - 10:52 AM Advanced Development (AD) is the "sandbox" between classical research and development (R&D) and Product Development (PD). Living in this grey zone, engineers in AD are typically in a role where they mitigate risk on technology being released from an R&D environment. Why this intermediate AD activity? The output from research teams still needs a good bit of work to prove its readiness for a production-ready development effort. When teams are on a product development track, the cost of failure is high.