Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies, has come under several cyber attacks by hacking community. Though not publicly acknowledged, some of them may have lead to data breaches as well. Also in between a new adversary has emerged in the form of Govt. assisted programs like NSA. It is now widely
5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals are now convinced of the value of the cloud and are starting to migrate their data over their. Now, it’s generally assumed that ones data is more secure within the cloud than it would if it were residing inside an unsecure desktop or server room.
Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency. With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device. But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data. This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice. This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel
Better Data Risk Mitigation for SaaS Providers We live in a world that is rife with internal-controls breakdowns that result in security and data breaches, which can cause tremendous business and reputational damage for organizations. The rise of cloud computing systems has now created an even greater need for organizations to develop the right controls to protect data that reside in the ‘cloud.’ Virtually every organization leverages Software-as-a-Service (SaaS) solutions – where data can be easily accessed through a web browser. As most technology providers are migrating away from larger enterprise data systems to the cloud, it opens the doors
The Lurking Threat of Bring-Your-Own-Cloud (BYOC) A few generations back, when the Internet was still an unknown commodity and inter-office mail came around in manila envelopes graffitied with the crossed-out signatures of every recipient that envelope had ever met, network security was largely an in-house affair with data tapes and mainframes playing a central role. One of the challenges for the IT wizards of that era was that no matter how sophisticated they made the system, employees would save time by writing their password on a piece of paper and taping it to the underside of the keyboard. It was
Five Ways to Boost Your Cloud’s Security There is no disputing the fact that Cloud computing is on the rise. Regardless of myths and rumors, Cloud computing is steadily becoming a more viable for various applications and uses. As such, the Cloud works by using the Internet for the storage and transmission of voice, data, and video. In doing so, adoption typically allows for cost efficiency, increased productivity, greater mobility, better interconnectivity of users, improved accessibility and flexibility, and more. That being said, it is not surprising to see more and more users, as well as companies (throughout various industries)
Cloud Infographic: How A Data Breach Happens While we are all very happy about the entire cloud data storage concept and feel that it’s a breath of relief from the constant battle against malware, key loggers, PC monitoring software, and whatnot, we tend to forget that there are steps which we need to take to ensure security even after we have shifted all our digital luggage to the cloud. 10 tips on how to protect yourself? Here is an informative infographic reviewing data breaches as well as another one (below) created by the group at: cloudhance.com Infographic Source: cloudhance.com