Jeudi 18 Septembre, Cercle National des Armées, Paris 8ème, 9h00 – 12h00
Une matinée sur "les enjeux d’une stratégie DevOps".
Après de longs mois de négociations et un teasing d’enfer, Netflix vient d’ouvrir ses portes en France. Le service de vidéo à la demande sur abonnement est accessible depuis l’application iOS universelle, l’app présente sur l’Apple TV, les consoles de salon, les téléviseurs connectés et également depuis un navigateur web.
Is cloud usurping IT outsourcing?
A new survey finds that for the second year in a row, IT outsourcing has fallen as a percentage of corporate IT budgets. Are enterprises pulling more initiatives in-house?
Gartner: Over 500 smart devices per home by 2022 Techgoondu As it becomes cheaper to fit sensors to consumer products, the number of smart devices in a typical home in developed countries could grow to over 500 by 2022, according to a new report…
Security in the cloud is on a lot of people’s minds following the hacking of celebrities’ iCloud accounts. When we hear about user accounts on cloud services and SaaS applications getting compromised, we start thinking more about he types of security capabilities that cloud providers offer versus what they leave unaddressed, and where responsibility should lie.
Although many people think that security is a monolith, in reality it’s much more of a mosaic — full of nuances and subtleties. There are undoubtedly various kinds of threats associated with cloud services. From the perspective of the cloud service provider, the most pressing security issue involves protecting its back-end infrastructure from outside attackers. An attacker who can break in through the back door can abscond with a wealth of data.
Businesses using SaaS services, or individual users of iCloud, have other concerns. Account compromise through the back door is worrying, but in particular, organizations must worry about attacks through the front door. User accounts may be compromised through phishing attacks (targeted or otherwise). There’s a risk of devices being lost or stolen. Or end-user systems may be infected with malware that results in session hijacking.
Let’s also remember that not all threats originate from the outside. What happens if malicious insiders decide to purloin sensitive data, like customer names and intellectual property, as they get ready to leave the company? And, along similar lines, how do you address inadvertent insiders — who may simply succumb to human error by mistyping an email address that causes data to be shared with someone who shouldn’t have access to it? The list goes on.
Click headline to read more–