Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

more productivity tips
wooden blocks

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

mexican election vote

MongoDB configuration error exposed 93 million Mexican voter records

A 132 GB database, containing the personal information on 93.4 million Mexican voters has finally been taken offline. The database sat exposed to the public for at least eight days after its discovery by researcher Chris Vickery, but...

0 title hacking competition

Hacking competitions that will get you noticed

The government's announcement of a pilot program "Hack the Pentagon" serves as a reminder of the opportunities available to newbies trying to get a foot in the door of the cyber security industry.

08 prediction

Top 15 security predictions for 2016

Cyber security experts and analysts weigh in on what the new year will bring in the world of evolving threats and solutions.

cloud computing pondering reflective mystery

How compliance can be an excuse to shun the cloud

Companies in heavily regulated industries say they can't embrace the cloud due to compliance. That's just an excuse.

us eu handshake

The impact of the new Trans-Atlantic privacy law

After 20 years of relative calm regarding the handling of personal data of EU citizens by U.S. companies, events over the past six months have instigated widespread reform. While the resolution is yet to be confirmed, the building...

01 dbaas title

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud.

inspection stormtroopers

Security and small thermal exhaust ports

I have always marvelled at the inability of the Empire and later the First Order to build a evil death machine without a simple exposure causing them issue. You would have thought that they would have reviewed the data after the...

smartphone encryption

MIT, Harvard researchers push new way for users to control access to personal data

Cryptography researchers at MIT and Harvard have developed software called Sieve that is designed to help users keep track of encrypted personal data and better manage it in the cloud.

jennifer lawrence oscars

Celebgate: Social engineering used to steal celebrity nude photos

On Tuesday, the Department of Justice, U.S. Attorney’s Office, Central District of California announced that Ryan Collins, 36, of Lancaster, Pennsylvania, plead guilty to violation of the Computer Fraud and Abuse Act.

cash 100s bills

A boatload of money to be spent on securing PCs, IoT and mobile devices

Forecast says $655 billion will be spent on securing personal computers, Internet of Things (IoT) and mobile devices.

cloud security

IT is getting cloud storage security all wrong

Two recent reports confirm that your greatest security threat is your users, not outside hackers.

cloud security
Q&A

This company migrated to the cloud to get BETTER security

SCOR Velogica chose AWS and 2nd Watch to help achieve SOC2 accreditation, figuring it would be easier than making the journey on its own

challenges facing infosec workers

8 things keeping security professionals up at night

As the need for enterprise data and technology grows, it only widens the skills gap for security professionals. That means, security professionals are feeling the pressure to get more done with less.

iphone apple fbi passcode

FBI rebuts criticism that it reset terrorist's iCloud password after attack

The FBI today rebutted assertions that it or San Bernardino County messed up when the iCloud password for the iPhone used by Syed Rizwan Farook was reset days after a shooting that left 14 dead.

IBM's z13 mainframe

Hardware is hot in cybersecurity

IBM's new z13s mainframe and Cisco's new Firepower next generation firewall

swarms of hackers

Faux phishing scheme shows how hacks unfold

Security software maker Bitglass created a dummy online persona and proffered it on the Dark Web as a phishing scam payload to see what hackers would do with it. The robust activity on the account underscores the seriousness of...

cybertech 2016 telaviv

CyberTech – The Golden Globes of information security

Here’s some of the most interesting firms I met with while at the CyberTech conference.

Load More