cloud security Archives - Page 2 of 2 - HyTrust

cloud security

Protecting Your Hypervisor: When the Enemy Breaks Through the Line, Command and Control Is the New Soft Underbelly

The foundation of modern day cloud security completely depends on the security of your hypervisor. It’s the hypervisor that controls and coordinates the functioning of virtual machines running on a server. With the shift to virtualization, the hypervisor becomes your most vulnerable point. In order to increase efficiency, organizations are condensing multiple virtual machines into […]

Read More

Continuous Monitoring Offers Sustainable Compliance

Verizon’s 2015 PCI report is out, offering some reassurance to those worried about the state of security in point of sale systems. But compliance rates continue to be low. The report notes that the number of organizations meeting full compliance nearly doubled from 2013. But only about a quarter of those organizations managed to remain […]

Read More

Addressing IT’s Biggest Security Concerns

Security has become the biggest worry the IT world faces. With a growing number of high-profile breaches and no end in sight, we thought it wise to examine the security issues that concern IT professionals most, ensuring our products are still addressing the security and compliance needs of businesses using virtual systems.

Read More

The Modern Virtual Data Center: Availability with Security and Compliance

Today’s enterprise IT professionals are fighting for their jobs. Who’s stealing them? AWS, that’s who. As businesses reach for the immediate gratification of Infrastructure as a Service – instant scale up, agility, no waiting for hardware provisioning – they aren’t thinking about security. They’re thinking about business benefits first, leaving security for someone else to […]

Read More

FDA Guidelines for Medical Device Security Offer Wise Approach to PHI Security

New voluntary guidance from the FDA tells medical device managers to address security before submitting devices for pre-market review. This approach underscores the importance of security integration in product design (not just for the device, but for the firmware and systems that host the data) rather than the add-on approach that has failed so many […]

Read More

Encryption Key Management vs. Cloud-Based Encryption: Protecting Data from Governments (and Hackers)

The Snowden scandal did more than alert businesses to the increasing dangers of system intrusion. It also made us realize that part of our national defense system includes keeping tabs on data in the cloud. With so much information stored in the cloud, how can we be sure those hosting our data aren’t obligated to […]

Read More

When Consumer Privacy Is a Competitive Advantage, Security Can Be a Marketing Tool

New research from Forrester predicts that strong privacy policies will give businesses a competitive edge in 2015. We think Forrester has a good point. Research shows that privacy is a major concern for consumers, so companies with strong security will be able to leverage their strength and enjoy the marketing benefits. When faced with the […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.