Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
Seeking to boost participation by federal agencies and cloud-service providers in the security vetting program known as FedRAMP, the General Services Administration has issued a two-year roadmap aimed at improving and enhancing the initiative.
It takes a new mindset to manage cloud infrastructure. And to truly reap the benefits from the cloud means that leaders must rethink their approach to infrastructure security. The degree to which one gives up control of IT infrastructure varies based on the adoption of private, public or hybrid platforms. But to...
There is a common perception among organizations that cloud security, especially when using a public cloud model - is a shared responsibility model.
According to one of the largest cloud services provider, Amazon Web Services "...the customer should assume responsibility and management of, but not limited to,...
The Council of the Inspectors General on Integrity and Efficiency says government data stored on cloud service providers' servers could be at risk because of insufficient enforcement of government rules.
As researchers scramble to learn more about Shellshock and the risks it poses to operating systems, servers and devices, Michael Smith of Akamai explains why not all patches are actually fixing the problem.
The automated version of the IT risk management and governance framework should save project leaders 30 to 60 hours of work over a manual process of building a secure IT system, ISACA President Robert Stroud says.
It is no secret that the move to cloud infrastructure offers organizations many compelling business benefits, including cost savings and on-demand scalability. Yet, in their rush to reap those benefits, business leaders often fail to grasp new realities.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Apple plans to add safeguards to help address security vulnerabilities exploited by celebrity photo hackers. But some security experts contend that the proposed changes won't block iCloud account hackers.
Enterprise CIOs and CISOs are asking: what does the cloud mean to enterprise security? In today's Everywhere Enterprise, mobile devices outnumber PCs, users are accessing applications and storing data in the cloud, and streaming media and social media are stretching the limits of corporate bandwidth and compliance....