Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies, has come under several cyber attacks by hacking community. Though not publicly acknowledged, some of them may have lead to data breaches as well. Also in between a new adversary has emerged in the form of Govt. assisted programs like NSA. It is now widely
The Three Modern Solutions For Cyber Security In The Cloud Various governments have adopted various approaches to their cloud policies. The Australian authorities, for example, have defined clearly who is liable for loss of data in a foreign server in data compromises that involve independent clients: the local company providing the storage service. There is more than meets the eye, however, in the background. The hybrid infrastructure has involuntarily taken over the overt preference for the private cloud. For many companies, especially in the Land Down Under, the private infrastructure is more secure than the public, but the fact of
Cloud Computing – What is Ahead! Top cloud computing trends of the current year Experts have started to believe that 2013 is going to be the year when enterprises are likely to cease worrying about cloud related security issues, and the market will see increasing popularity of cloud services. These speculations are based on industry surveys conducted by many reputable market analysts and technology reviews. It is predicted that year 2013 will witness growing popularity of hosted services and solutions, and more companies to migrate their prime IT assets to the cloud as they see more returns from cloud technologies.
How To Prevent Google Apps Data Loss According to Google, more than 4 million businesses use Google Apps. It provides core collaboration and communication tools like Gmail, Calendar, Contacts and Drive. In this context, it is obvious that business users trust Google’s cloud to run critical parts of their data and systems. Google Apps includes critical security features and disaster recovery capabilities specifically designed to keep data safe and secure. But I want to make it clear that all these features are created to recover from the disasters that affect data from system failures, not from those that affect your business, like human error. If one
Web Hosting Moves To The Cloud With Managed Cloud Hosting In years past, companies looking to host a high-traffic website have had one of three main options: Shared Web hosting services Dedicated Web hosting services Hosting on local IT infrastructure Shared Web hosting services have been most popular with small businesses, but they suffer from performance bottlenecks, limited management features, and no direct server access. Dedicated Web hosting offers a solution to the performance issues of shared Web hosting—but at a cost. Monthly rates are typically high, and support is either expensive or nonexistent. Local hosting has been the route
Cloud Provider Joins Elite Roster of Nicira’s OpenStack Customers Palo Alto, Calif., April 9, 2012 – Nicira, the network virtualization company, today announced that Southern California-based cloud provider DreamHost will deploy its Network Virtualization Platform (NVP). DreamHost joins global leaders NTT, Rackspace and others using Nicira’s software to reduce costs and accelerate service delivery in its OpenStack™ data center environments. “Nicira’s NVP software enables truly massive leaps in automation and efficiency,” said Carl Perry, Cloud Architect at DreamHost. “NVP decouples network services from hardware, providing unique flexibility for both DreamHost and our customers. By sidestepping the old network paradigm, DreamHost