Tag Archives : #security

Cloud Security Alliance: Sanctioned and unsanctioned apps in cloud ecosystems

InsightaaS: Today’s featured post, from the Cloud Security Alliance, actually has an even-longer (and for some reason, all caps) title than is presented above: SECURING THE INTERSECTION OF SANCTIONED AND UNSANCTIONED APPS IN CLOUD ECOSYSTEMS. Odd naming conventions aside, it provides insight into an important issue. Published by the chief scientist at Netskope, it presents data on the […]

dreamstime_s_27191278-cloud library

Ijaaz Ullah, VP, information technology and privacy officer, Nightingale

Scaling EHR with CenturyLink cloud

Founded in 2002, Nightingale is one of the largest providers of cloud-based Electronic Health Record (EHR) and practice management solutions to Ontario healthcare organizations, and is expanding its business in several other Canadian provinces and the US. Adopting a workflow-based approach, the company works to automate processes in practice management, medical records management, billing and […]

IBM: DroppedIn: Remotely Exploitable Vulnerability in the Dropbox SDK for Android

InsightaaS: Research shows that cloud is the most important issue on the IT agenda for 2015, followed closely by mobility; and it also shows that storage is a key workload in the cloud. It makes sense, then, that cloud as a mobile storage platform is central to both corporate infrastructure and to mobile apps, and […]



ESG: Antivirus Usage Patterns Reveal Hints about Its Effectiveness

InsightaaS: ESG is a Massachusetts-based analyst firm that offers a wide range of research and advisory services. Today’s featured post is based on a recent report published in the firm’s security and related services. In it, senior principal analyst Jon Oltsik looks at the relationship between how antivirus is purchased and used and how it […]

IT World Canada: Five steps to a zero-trust network

InsightaaS: IT World Canada is the country’s leading IT trade publisher. It provides a “pulse of the industry” view that is valued by buyers and sellers alike, and also produces longer-format pieces on key IT issues. Today’s featured post is based on an interview with Forrester principal security analyst John Kindervag (who, parenthetically, was featured […]