Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
Olivier Amar loves the Internet and the experience that a good application can provide by accessing your data. But with years of experience in online performance marketing for companies like AIG, WSOP, Harrahs, ElAl, GetTaxi and Toyga Financial, he understands how exposed our personal ...
For most organizations, developing a cloud strategy is no longer a matter of “if,” but a matter of how. The right cloud strategy can significantly reduce costs, offer instant scalability, and improve business agility. But to get the most from the cloud and position their businesses for...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partne...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Panzura has added new Secure Erase and Enterprise Antivirus Connector technologies in version 5.4.1.0 of its PZOS operating system for the Panzura Global Cloud Storage System. These new features increase security options beyond Panzura's FIPS 140-2 Level 3 encryption, which was announc...
As web applications and cloud services continue to proliferate, identity theft, cyber fraud, cyber bullying, and simple misuse of confidential information online expand to chronic levels. Yet cloud providers are expected to ensure high security while maintaining a convenient user exper...
Enterprises that rely heavily on fax, view regulatory compliance as a major business component. Non-compliance issues that arise from security breaches and other forms of information leakage often result in substantial regulatory penalties, both civil and criminal. As government regula...
If you are worried about securing your sensitive data in commercial storage services here is a guide to how you can encrypt your sensitive data. The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data store...
As regulatory oversight across the financial landscape continues to drive greater transparency and stricter penalties, outsourcing to the private cloud has become an integral resource for hedge fund and private equity managers. Cloud infrastructure services are now synonymous with incr...
Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the ...
Not-for-profits and cloud computing seem to be made for one another. The cloud IT delivery model is well suited to not-for-profits (NFPs) for a number of reasons, according to an article on CMO.com. There are little to no upfront costs with cloud services and consumption is usually b...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
The pace of cloud growth and adoption remains inextricably linked to the pace of cloud education. Whether it’s due to security concerns being allayed or cloud definition confusion being reduced, the small- and medium-business space seems ripe for education-based growth. Add in the cont...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP. Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfu...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations – all are factors involved and the percei...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
“We see many companies looking to adopt BYOD strategies for employees, but few who are solely BYOD,” observed Milja Gillespie, Director of Product Marketing, Mobile Security, SAP, in this exclusive Q&A with Cloud Computing Journal. “Often, they offer corporate devices for certain types...
CloudEntr allows users to gain convenient access to all their web-based applications by authenticating just once with a unique log-in credential. With CloudEntr businesses are also able to smoothly transition from weak user-selected passwords to stronger protection, through complex pas...
"Validation of our PCI DSS compliance ensures that our API Management customers can leverage our enterprise-class cloud platform to ensure the security and availability of their applications and data, as well as help meet their own requirements for PCI compliance in their API Programs"...
Akamai Technologies, Inc. and Prolexic Technologies, Inc. announced on Monday that the two companies have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise IP applications from distribut...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring. Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
A cloud security take on an old riddle: analyze risks, identify needs, develop priorities, deploy scalable model, and leave room for dessert. Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a...
A few weeks ago, Gartner shared its list of top 10 technology trends for 2014, including among its expectations one entitled: “Hybrid cloud and IT as Service Broker.” This prediction speaks to what Gartner views as the necessity of the hybrid cloud – a mix of private cloud combined wit...
When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches. Of course I think of the cloud when discussing security. In the contemporary world...
Cisco, like everybody else in IT, believes that cloud computing is central to the Internet of Things (the belief that everything with an on/off switch will eventually be wired or wirelessly connected and controlled by someone – or some thing – somewhere in the world). This isn't a diff...
SoftLayer, an IBM Company, has announced that SilverSky, a provider of cloud-based information security and messaging solutions, has chosen SoftLayer to help power its cloud-based email and Email Protection Suite offerings. SilverSky’s comprehensive security services, running on SoftLa...
Despite accusations against the gov't of data harvesting and privacy invasion, IDaaS is a feasible and trustworthy option to maintain identity protection. Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of ever...
Verizon is calling on the expertise of one of its recent acquisitions to offer a cloud computing service to its customers. Verizon has announced details about a new cloud computing service for business, Verizon Cloud, an IaaS offering the company claims will offer better end-user con...
As web applications continue to proliferate, identity theft and fraud expand to chronic levels in the US. Back in 2006, the FTC reported over 8M victims of identity theft with cases costing $5000 and 1200 hours to repair the damage, and it’s only gotten worse since then. MasterCard and...
Stats show risk grows in disproportion to IT security readiness. Security deployed, managed from the cloud provides strong results. How cloud security overcomes the obstacle. It’s simple, really. More bang for the buck. Using the ability to apply operation expenses over capital ones ...
More and more people are getting credit cards with a built-in RFID chip in them. That little RFID chip (Radio Frequency ID) can transmit your credit card info out several feet when it is scanned by any reader. Most people don’t know this. You can tell if your credit card has an RFID i...
For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the maj...