Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to on-premise and cloud-based systems, applications and devices.
In this podcast, Kemp talks about unified identity services, as well as a partnership with Samsung.
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private cloud.
The answer to this question can be found in the old Russian maxim, which was often quoted by President Ronald Regan: trust but verify.
Cloud services are outside the direct control of the customer organization; this means that a governance based approach is needed. This approach allows trust in the CSP to be assured through a combination of internal processes, standards and independent assessments.
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft's TWC group, talks about volume 13 of Microsoft's Security Intelligence Report which analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide.
In this age of social networks, discovering personal information about users has become increasingly easy to do, and that information can be misused at a later date for stealing their identities or leveraged to make them trust attackers.
In this Help Net Security podcast Catalin Cosoi, Chief Security Researcher for Bitdefender, talks about the company's efforts for making users aware of the privacy issues on the Internet, and warns about the fact that even if you're avoiding using social media, there might be information about you on the Internet that you would prefer not to be available to everyone.
Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information - whether its intellectual property, partner or customer information.
CxOs are aware that at any moment their company could be under attack. They are also aware that the various departments within their organization use specific applications - all with different authentication requirements.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.