cloud security
Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services
Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]
#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Compliance and Data Privacy Leader Evelyn De Souza, about Cloud Security. Brian Remmel (@bremmel) moderates and Andres Sarmiento and Denise Fishburne are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See […]
Q&A: Cisco IT’s Lessons Learned In Assessing the Risk of New Cloud Services
2,000+ That is the approximate number of cloud services that Ken Hankoff, Manager of Cisco IT Risk Management’s Cloud and Application Service Provider Remediation (CASPR) Program believes Cisco’s 70,000 employees use. For the last 14 years, this program has assessed and remediated risks associated with using a cloud-hosted service. An assessment process for new cloud […]
Mobile Cloud Security: What CXOs Need to Know
As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility […]
Business Continuity and Workload Mobility for Private Cloud (Cisco Validated Design-Part1)
As a Cloud Architect, I’ve had the privilege to work with CTOs and CIOs across the globe to uncover the key factors driving Business Continuity and Workload Mobility across their cloud infrastructures. We’ve worked with enterprises, large and small, and service providers to answer their top five concerns in our new Business Continuity and Workload Mobility solution for […]
Summary: Mitigating Business Risks
Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.
Old and Persistent Malware
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:
Three Steps to Secure Cloud Enablement
I’ve been pretty forthcoming in sharing my belief that the security industry in general continues to struggle to transition from old ways to new, and that in today’s day and age we have to adapt quickly. The rise of mobile computing and communications (users, data, services) combined with increasing volumes of cloud services data traffic […]
Emerging Cloud Models: Community Cloud
There is no disputing that both enterprises and service providers are embracing cloud. What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several […]
1