cloud security

October 2, 2014

DATA CENTER

Q&A: Cisco IT’s Lessons Learned In Assessing the Risk of New Cloud Services

4 min read

2,000+ That is the approximate number of cloud services that Ken Hankoff, Manager of Cisco IT Risk Management’s Cloud and Application Service Provider Remediation (CASPR) Program believes Cisco’s 70,000 employees use. For the last 14 years, this program has assessed and remediated risks associated with using a cloud-hosted service. An assessment process for new cloud […]

September 18, 2014

SECURITY

Mobile Cloud Security: What CXOs Need to Know

4 min read

As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility […]

August 25, 2014

DATA CENTER

Business Continuity and Workload Mobility for Private Cloud (Cisco Validated Design-Part1)

4 min read

As a Cloud Architect, I’ve had the privilege to work with CTOs and CIOs across the globe to uncover the key factors driving Business Continuity and Workload Mobility across their cloud infrastructures. We’ve worked with enterprises, large and small, and service providers to answer their top five concerns in our new Business Continuity and Workload Mobility solution for […]

July 29, 2014

SECURITY

Summary: Mitigating Business Risks

1 min read

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.

July 21, 2014

SECURITY

Old and Persistent Malware

2 min read

Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:

May 16, 2014

DATA CENTER

Emerging Cloud Models: Community Cloud

2 min read

There is no disputing that both enterprises and service providers are embracing cloud.  What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and  jointly accessed by several […]

May 12, 2014

DATA CENTER

How Anyone in Any Industry Can Get Started in Cloud

3 min read

In today’s business landscape, cloud adoption and deployment is more than just a technical discussion. It’s really a choice about how to operate your business, regardless of what industry or vertical your organization is affiliated with. However, as a former CIO, I understand that many CIOs are more concerned with the challenges they face when […]

April 17, 2014

DATA CENTER

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

4 min read

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]

April 8, 2014

SECURITY

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

1 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]