It’s Time to Bring Cloud Environments Out of the Shadows

Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk.

The post It’s Time to Bring Cloud Environments Out of the Shadows appeared first on Security Intelligence.

Continue reading It’s Time to Bring Cloud Environments Out of the Shadows

Dropbox sets IPO range $16-18, valuing it below $10B, as Salesforce ponies up $100M

After announcing an IPO in February, today Dropbox updated its S-1 filing with pricing. The cloud services and storage company said that it expects to price its IPO at between $16 and $18 per share when it sells 36,000,000 shares to raise $648 million … Continue reading Dropbox sets IPO range $16-18, valuing it below $10B, as Salesforce ponies up $100M

Bringing Shadow IT Into the Security Light

Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise’s security posture.

The post Bringing Shadow IT Into the Security Light appeared first on Security Intelligence.

Continue reading Bringing Shadow IT Into the Security Light

Distributed Air Quality Monitoring via Taxi Fleet

When [James] moved to Lima, Peru, he brought his jogging habit with him. His morning jaunts to the coast involve crossing a few busy streets that are often occupied by old, smoke-belching diesel trucks. [James] noticed that his throat would tickle a bit when he got back home. A recent study linking air pollution to dementia risk made him wonder how cities could monitor air quality on a street-by-street basis, rather than relying on a few scattered stations. Lima has a lot of taxis, so why wire them up with sensors and monitor the air quality in real-time?

This taxi …read more

Continue reading Distributed Air Quality Monitoring via Taxi Fleet

Evolving Cloud-Native Applications Require New Best Practices

As cloud-native applications become faster and more flexible, the security solutions that protect these applications must take on the same characteristics.

The post Evolving Cloud-Native Applications Require New Best Practices appeared first on Security Intelligence.

Continue reading Evolving Cloud-Native Applications Require New Best Practices

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

The post Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption appeared first on Security Intelligence.

Continue reading Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

The post Internet-Connected Toys: Cute, Cuddly and Inherently Insecure appeared first on Security Intelligence.

Continue reading Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Who Is Responsible for Cloud Security?

Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.

The post Who Is Responsible for Cloud Security? appeared first on Security Intelligence.

Continue reading Who Is Responsible for Cloud Security?

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.

The post Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications appeared first on Security Intelligence.

Continue reading Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications