When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.
Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.
In September, a series of attacks included an assault on the French web hosting company OVH that reached a once inconceivable 1.1 terabits per second. And the very next month, an attack on the web infrastructure provider Dyn topped that, reportedly hitting 1.2 terabits per second.
As the Internet of Things (IoT) expands (Gartner says there will be more than 20 billion connected devices by 2020), so do the number of devices that can conceivably be "weaponized" by hackers
, , ,
In my latest blog post, “Cloud Security: ‘How’ Not ‘If,’” I discussed ways organizations have addressed cloud security issues, including hybrid cloud scenarios that keep sensitive data private. But is it really possible to make the entire hybrid cloud so secure that application workloads and data can travel at will and realize the best combination of safety, performance, agility and return on investment? Can we reach this hybrid cloud security nirvana?
Increasingly, it’s no longer a matter of whether the cloud is or isn’t secure. It’s really about crafting a detailed strategy and architecture that delivers the exact level of security and compliance your organization requires.
Equinix is excited to announce that we are now a corporate member of the Cloud Security Alliance, a global nonprofit that promotes best practices for security within cloud computing and provides education on the cloud that helps secure all other forms of computing.
A new, high-growth market segment of cloud access security brokers is gaining traction with enterprises amid persistent concerns about security in the cloud.
The best way to deal with morphing attack surfaces is to implement what the military calls “defense-in-depth,” where multiple security layers protect digital assets.
Barely a week passes without news of another high-profile security breach. That makes embracing a broadened IT perimeter seem risky, but it’s not as perilous as it might seem. If you are properly informed and do your homework, you can make a confident decision.