The Great Arms Race For Security: Virtualization Since its infancy in the early seventies when the first computer virus was created, the malware and anti-malware business has grown into multi-billion dollar industries. No longer are script kiddies creating malware for notoriety, instead the malware industry is run by organized criminals who invest time and money in new technologies and methods to compromise systems for profit. The evolution of malware is the driver for the progress of security. Malware propagation has gone from floppy disks, to email attachments, and on to remote exploits of vulnerabilities. Malicious software itself has become more
Privacy In Cloud Computing: Assured Or Assumed? All avid computer users have enjoyed the benefits and conveniences of cloud computing, either knowingly or unknowingly. Most of us rarely understand what is happening behind the screens, especially when lost in interesting movie or music, or even when perusing the information about your competitors. As a result, the privacy and security of the information in cloud is sometimes assured. What of other times? Is it assumed? Most of us overlook privacy warning and security procedures when utilizing the ever-dazzling gadgets, most of which expose us to an elevated echelon when it comes
Why You Have To Take Advantage Of Cloud Email In general, when an entity has its own server, it is but expected that it will also have its own email system. With the popularity of web based services, instead of having the domain name as the suffix of the email address, the service name becomes the suffix. Thus, email@example.com or firstname.lastname@example.org has become popular. A lot of cloud email service suppliers can now provide domain name as your suffix in the email address. Therefore, when you take advantage of such service, your email recipients will see email@example.com as your email
Security as a Service: Business Decision Factors This paper reviews the business value of IT security, illustrates the business case for SaaS over “do it yourself” premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow. In a companion paper, we show how Security as a Service (SaaS) protects small and midsize businesses from an unprecedented storm of malicious code, while escaping the tradeoff among security, performance, and cost that premise-based security forces on them. This paper looks at the business issues in SaaS: the value it unlocks,
Akamai Introduces New Cloud Defense Solutions Akamai Technologies, Inc. unveiled new cloud defense architecture aimed at protecting customers from increasing number of sophisticated Web attacks. Enhancements include improved protection from distributed denial of service (DdoS) attacks as well as improved cloud firewall featuring advanced vulnerability scanning and custom rules for additional protection against application layer attacks, the company said in a press release. Companies worldwide incur estimated losses of one trillion dollars a year, according to antivirus company McAfee, and Akamai unveils a new cloud security solution to help global business reduce financial damages from the growing number cyber attacks.