News Articles

News Articles

News Articles

The new PCI SSC guidelines: Separating the cloud from the fog

| May 13, 2013

The truth is somewhere in between. With the right skills and technologies, the cloud can indeed be engineered to keep data secure. Security challenges exist, yes, but merchants can overcome them by working with a cloud service provider (CSP) who knows how to optimize security and deliver a service model that fits their risk and […]

News Articles

The new Omnibus rule: How will it impact healthcare IT vendors?

| April 29, 2013

As a modification of HIPAA’s previous requirements, this new ruling impacts the HIPAA Privacy, Security, Breach Notification and Enforcement Rules – and that can mean significant change for many healthcare IT vendors.  

News Articles

Dangerous Cross-Site Request Forgery Attacks Up 132 Percent Since Q1 2012

April 23, 2013

FireHost’s New IP Reputation Management filters block hack attempts from more than one million known attackers Infosecurity Europe 2013, London, UK – April 23rd, 2013 — Secure cloud hosting company, FireHost, has announced today its Q1 2013 web application attack statistics, detailing the type and number of the most dangerous cyberattacks blocked by the firewalls […]

News Articles

Three Ingredients to Maintain Performance and Security

| April 09, 2013

To keep its system from falling prey to downtime, IT stakeholders must be part of a proactively designed strategy that’s ready to be deployed at a moment’s notice. Luckily, you can get well on your way to keep performance and security intact while you scale, by ticking three boxes.  

News Articles

Locking down your cloud, part 1: One Step at a Time

| April 03, 2013

A highly secure cloud is not a myth. It’s not even out of reach. In fact, you can lock down your virtual infrastructure as tightly as any Fortune 50 enterprise does, by getting four components right: security, management, performance, and compliance.

News Articles

Locking Down Your Cloud: One Step at a Time

| April 03, 2013

A highly secure cloud is not a myth. It’s not even out of reach. In fact, you can lock down your virtual infrastructure as tightly as any Fortune 50 enterprise does, by getting four components right: security, management, performance, and compliance.  

News Articles

Carl Brooks | 451 Research

April 01, 2013

FireHost included in list of emerging cloud hosting companies. The is the first of a series of reports identifying and examining an emerging trend in cloud and hosting: providers serving vertical markets with specific IT products and services for several tech-dependent industries.

News Articles

FireHost Expert Discusses Largest DDoS Attack with the BBC (MP3)

| March 28, 2013

Daniel Beazer, Director of Strategy, talks with BBC Channel 5 about the largest DDoS attack ever – a 300 gbps DDoS attack, that took place earlier this week. Mr. Beazer explains whether or not he believes the attack actually slowed down the whole internet.  

News Articles

Security Fears Give Way to Economics as Cloud Computing Grows

| March 27, 2013

“It’s a double-edged sword, we have thousands upon thousands of different customers on our infrastructure, and we’re seeing attacks on those tenants. But the benefit of our infrastructure is we can use all the attack data to protect other clients.” says Chris Hinkley, Senior Security Architect for FireHost.  

News Articles

To Store or Not to Store?

| March 26, 2013

It is possible to hold data securely in the cloud. As long as the merchant ensures they make the right choices when doing so, such as selecting a properly secure, compliant enterprise class cloud platform, security becomes no greater issue than it would be in any traditional dedicated or private cloud hosting infrastructure.