Salesforce: Improving Cloud App Security
Cloud application security is a growing concern as companies large and small make the move from in-house servers to off-site compute resources. Cloud metrics app Datadog — which counts big businesses such as AWS, Slack, and Fastly among its major partners — was recently the victim of a data breach and is now recommending that users revoke and change their credentials. With cloud computing now a requirement to compete globally and find success locally, how do companies ensure app security is up to par?
Weaponized Software: The Case For Better Cybersecurity
Software as a weapon? It’s not only possible, it’s rapidly becoming commonplace — as evidenced by recent malware attacks that led to the transfer of more than $81 million from the Federal Reserve Bank of New York to private accounts in Asia, while point-of-sale malware continues to frustrate large retail companies. With hackers getting smarter and software more sophisticated, how do companies take cybersecurity to the next level?
It's no longer viable for companies to spend on IT services without hope of return — the days of unrestrained “cost center” efforts are quickly vanishing as businesses look for ways to make information technology part of board room discussions. To achieve this aim, many organizations turn to ITIL (formerly the Information Technology Infrastructure Library), which is designed to standardize IT processes and apply consistent practices across the entire technology life cycle. However, that's just the beginning — here's a look at the top five benefits of adopting ITIL.
Far From The Tree? Malware-Laden Applications Fall Into The App Store
Mobile malware is on the rise. As noted by Securelist, 2015 saw an uptick in the number of malicious attachments users were unable to delete, strong growth in the volume of ransomware, and the use of phishing windows to conceal legitimate apps. Perhaps more worrisome, however, is the spread of iOS malware through the App Store itself — what was once Apple’s bastion of security is starting to crack.
Welcome to 2016! Although our blog is now more than five years old, this last year we strived to bring you a greater amount of thought leadership and share a multitude of practical tips on how to leverage technology to improve performance within your organization. With the rise and prevalence of data hacks in 2015, it’s no surprise we had a number of posts this past year covering information security. Cloud computing and digital service management also made headlines in 2015 with the broad shift toward consumerization and digitization. As such, they were both covered in our blog as well. Here’s a look back at the most read blogs of 2015:
- Column Technologies Announces New Managed Services Offering for SailPoint IdentityIQ
- The Forrester Wave: North American ITSM Implementation Services Providers
- Column Technologies Establishes Global Services Practice to Support the Implementation of the OS3 Suite from SMI Telecoms
- Office of the Ohio Inspector General Selects the Column Case Investigative Solution for their Internal Investigations