The Five Personas of Cloud Adoption

It is no longer enough to say that business comprises those who have adopted cloud technology and those who will adopt cloud technology. New research from NTT Com Security (erstwhile Integralis) describes five separate personas in attitude to cloud; al…

Read More >>

Companies’ Cloud Risk Assessments Are Wildly Off

Even as headlines focus on the security of one’s internet-based cloud communications, at least one study shows that organizations lack the information to understand and mitigate the broader set of risks posed by the use of cloud services. In fact, thei…

Read More >>

F-Secure’s Threat Report H1 2013

F-Secure’s Threat Report for the first half of 2013 says that threat vectors have remained similar but got worse over the first half of this year. Watering hole attacks and mobile malware are good examples.

Read More >>