cloud security

December 2, 2014

DATA CENTER

Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services

Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]

October 21, 2014

PERSPECTIVES

#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Compliance and Data Privacy Leader Evelyn De Souza, about Cloud Security. Brian Remmel (@bremmel) moderates and Andres Sarmiento and Denise Fishburne are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See […]

October 2, 2014

DATA CENTER

Q&A: Cisco IT’s Lessons Learned In Assessing the Risk of New Cloud Services

2,000+ That is the approximate number of cloud services that Ken Hankoff, Manager of Cisco IT Risk Management’s Cloud and Application Service Provider Remediation (CASPR) Program believes Cisco’s 70,000 employees use. For the last 14 years, this program has assessed and remediated risks associated with using a cloud-hosted service. An assessment process for new cloud […]

September 18, 2014

SECURITY

Mobile Cloud Security: What CXOs Need to Know

As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility […]

August 25, 2014

DATA CENTER

Business Continuity and Workload Mobility for Private Cloud (Cisco Validated Design-Part1)

As a Cloud Architect, I’ve had the privilege to work with CTOs and CIOs across the globe to uncover the key factors driving Business Continuity and Workload Mobility across their cloud infrastructures. We’ve worked with enterprises, large and small, and service providers to answer their top five concerns in our new Business Continuity and Workload Mobility solution for […]

July 29, 2014

SECURITY

Summary: Mitigating Business Risks

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.

July 21, 2014

SECURITY

Old and Persistent Malware

Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:

June 4, 2014

SECURITY

Three Steps to Secure Cloud Enablement

I’ve been pretty forthcoming in sharing my belief that the security industry in general continues to struggle to transition from old ways to new, and that in today’s day and age we have to adapt quickly. The rise of mobile computing and communications (users, data, services) combined with increasing volumes of cloud services data traffic […]

May 16, 2014

DATA CENTER

Emerging Cloud Models: Community Cloud

There is no disputing that both enterprises and service providers are embracing cloud.  What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and  jointly accessed by several […]