Trend Micro Predicts Cyber Security Concerns for 2014 and Beyond Mobile threats, targeted attacks and vulnerabilities for the Internet of Everything highlighted DALLAS, Dec. 9, 2013 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) today released its annual security predictions report, “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond.” The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and targeted attacks will accelerate. Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web, are also highlighted. The report parallels Trend Micro’s long-term projections
Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies, has come under several cyber attacks by hacking community. Though not publicly acknowledged, some of them may have lead to data breaches as well. Also in between a new adversary has emerged in the form of Govt. assisted programs like NSA. It is now widely
Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost savings, convenience, scalability, conversion of CAPEX to OPEX are some of the features that go in favor of cloud solutions. These can help an organization accomplish a lot in a short span of time. Not to forget that cloud service providers do a phenomenal job
5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals are now convinced of the value of the cloud and are starting to migrate their data over their. Now, it’s generally assumed that ones data is more secure within the cloud than it would if it were residing inside an unsecure desktop or server room.
What PCI DSS 3.0 Means For Cloud Service Providers The only constant is change. Earlier this month, the Payment Card Industry Security Standards Council released version 3.0 of the PCI DSS standard (along with the accompany Payment Application Data Security Standard). In it are a few key focus areas that will directly affect Cloud Service Providers (CSPs), which is why it makes good business sense to start thinking about version 3.0 right now. While some of the rules aren’t required for existing implementations until 2015, smart CSPs understand that customers will certainly be asking about the changes in 2014. The
Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency. With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device. But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data. This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice. This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel
Firehost Reveals Increases in Cyberattacks in its Superfecta Report There are always wolves at the door, and they are relentless in both their creativity and determination when it comes to getting in. This is the message that can be gleaned from a report released Tuesday October 22, by FireHost, (www.firehost.com) a provider of managed, secure cloud IaaS. Their Superfecta report highlights upticks in Cross-site Scripting (XSS) and SQL Injection activity that specifically target applications carrying sensitive information about organizations and their customers. “The adoption of cloud computing, mobile applications and virtualized enterprise architectures have led to an expansion of applications that are
Cloud Data Storage – File Sync On Steroids For The Enterprise Cloud storage is getting saturated, fast. How many of you use just a single, or maybe two Cloud storage services? Yes, I know. None. We all have our data flying around the Cloud. While only a few Cloud sync and storage services are positioned to become clear winners in this game, the landscape on the enterprise side is witnessing increased thirst for faster and simpler ways to store, sync and collaborate on enterprise data stored on the Cloud, be it private or public. Egnyte – an enterprise Cloud data