Hand drawn Cloud computing security icon. Cloud computing security sketch icon for infographic, website or app. – Stock Vector from the largest …
Shadow IT, a term that loosely refers to any technology that is used in a company without the oversight of the IT department, isn’t a new concept. But companies don’t seem to have a better handle on it now than they did when we first started writing about it.
Today, about a third of a company’s tech purchases take place outside of IT. And a survey by Cisco found that while IT departments assumed their companies used 51 cloud service, employees in fact used 730 cloud services. Now consider that the average organization has 19.6 cloud-related security incidents each month. Suddenly, you’ve got a big problem on your hands.
This infographic from cloud file management and storage provider SmartFile offers insight into the Shadow IT phenomenon, the hidden costs to your organization, and why it isn’t likely to go away anytime soon.
… best practices for providing security assurance within Cloud Computing and to provide education on the uses of Cloud Computing to help secure all …
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here’s a look at 7 ways the cloud may be the largest driver of IT security today.
The Cloud Security Alliance (CSA) recently released “The Treacherous 12: Cloud Computing Top Threats in 2016,” which provided a run-down on the …
Despite the pervasive use of the cloud to handle complex, secure workloads, many organisations question whether the cloud is natively secure.
Prior to the ISO certification, Google Drive has been certified as compliant with the SOC 2 and SOC 3 security standards for cloud computing.
The director of the NSA, Admiral Michael Rogers, just admitted at a Senate hearing that when Internet companies provide copies of encryption keys to law enforcement, the risk of hacks and data theft goes way up.
The government has been pressuring technology companies to provide the encryption keys that it can use to access data from suspected bad actors. The keys allow the government “front door access,” as Rogers has termed it, to secure data on any device, including cell phones and tablets.
Rogers made the statement in answer to a question from Senator Ron Wyden at the Senate Intelligence Committee hearing Thursday.
Wyden: “As a general matter, is it correct that anytime there are copies of an encryption key — and they exist in multiple places — that also creates more opportunities for malicious actors or foreign hackers to get access to the keys?
View the exchange in this video.
Security researchers have been saying for some time that the existence of multiple copies of encryption keys creates huge security vulnerabilities. But instead of heeding the advice and abandoning the idea, Rogers has suggested that tech companies deliver the encryption key copies in multiple pieces that must be reassembled.
“The NSA chief Admiral Rogers today confirmed what encryption experts and data scientists have been saying all along: if the government requires companies to provide copies of encryption keys, that will only weaken data protection and open the door for malicious actors and hackers,” said Morgan Reed of the App Association in a note to VentureBeat.
Cybersecurity has taken center stage in the halls of power this week, as Chinese president Xi Jinping is in the U.S. meeting with tech leaders and President Obama.
The Chinese government itself has been linked with various large data hacks on U.S. corporations and on U.S. government agencies. By some estimates, U.S. businesses lose $ 300 billion a year from Chinese intellectual property theft.
One June 2nd, the Senate approved a bill called the USA Freedom Act, meant to reform the government surveillance authorizations in the Patriot Act. The Patriot Act expired at midnight on June 1st.
But the NSA has continued to push for increased latitude to access the data of private citizens, both foreign and domestic.
NEW YORK, Sept. 24, 2015 /PRNewswire/ — Proliferation of cloud computing in the market has been remarkable as benefits gained from cloud based …
… ISO certification, Google Drive has been previously certified as being compliant with the SOC 2 and SOC 3 security standards for cloud computing.