You Are Browsing ‘Cloud ’ Category

Comments Off on StorageCraft to Launch Cloud Data Protection Solution
(Source: Utah Pulse) StorageCraft Technology Corp. announced that it will be launching a cloud-to-cloudbackup and recovery platform. The platform will be the newest addition to ......
Comments Off on AT&T Hopes Open Source SDN Platform Will Become ‘Industry Standard’
(Source: Virtualization Review) .. the homegrown software platform powering its software-centric network that leverages software-defined networking (SDN) and network functions virtualization ......
Comments Off on IPC launches Cloud Community of the Philippines
(Source: MIS Asia) The CloudComPH also aims to work with industry and the government to encourage organisations to leverage cloud computing in achieving their goals...
Comments Off on Safeguarding Against Colluding Mobile Apps
Have you heard of mobile app collusion? Seemingly benign apps are working together to execute attacks.  Read this solution brief from Intel Security to learn more about how to protect against mobile app collusion. ...
Comments Off on Safeguarding Against Pinkslipbot
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. This malware allows complete control of infected systems through a command-based backdoor operated by the control server as well as a virtual network computing-based backdoor. Pinkslipbot can also spread to other systems within the environment through network shares and can communicate to its control server to download updated versions o...
Comments Off on Threat Defense Isn’t Just About Protection
Endpoint defenses shouldn't just spot trouble—they need to respond quickly and remediate threats fully. Learn why integration is essential for intelligent endpoints. ...
Comments Off on Building Resilience in a Digital Enterprise: Transforming From Compliance to Risk Management
Organizations are looking to embed security into the culture and enterprise architecture of the business to ensure its resilience for the long term and reap the benefits of the current revolution. Building a strategy for resilience by growing capability towards a trusted level will help ensure sustained business continuity in the face of any threat. ...
One of the most serious security challenges facing enterprises today is that of the insider threat. The Intel Insider Threat Field Guide was designed to help enterprises better understand insider threats and take steps to minimize the associated risks. ...
Comments Off on Disrupting Targeted Attacks Solution Guide
In early 2015, an Intel® Security survey of incident responders at 700 organizations uncovered the hurdles and opportunities facing investigators of targeted enterprise attacks. This solution guide highlights the findings, addresses the challenges, and provides several solutions that help unify the Protect, Detect, and Correct stages of managing threats. The goal is to build a comprehensive security model to more efficiently combat targeted attacks. ...
Comments Off on Busted: Seven Myths of Advanced Malware
Advanced malware is the catchall term for the most sophisticated, evasive, destructive, and ever-evolving cyber threats. Fed by lack of understanding and anxiety―and sometimes perpetuated by security vendors―a number of misconceptions have arisen concerning this cyber menace. This guide will examine seven common misconceptions and distinguish between myth and reality. ...