Category Archives: Security

Around The Cloud – Top Tech News For The Week

Around The Cloud – Top Tech News For The Week

Top Tech News

Cybersecurity seems to be the buzzword of this past week’s news, starting with Yahoo dropping the public relations bomb that over 500 million user accounts were compromised in 2014 by what they are calling a “state-sponsored actor.” Names, email addresses, telephone numbers, dates of birth, hashed passwords, and security questions and answers were among the credentials Yahoo listed as having been stolen. Yahoo also claims that unprotected passwords, payment card data, and bank account information were not among the records that were stolen, since they were not stored on the hacked system. You can read more about this security breach at Business Insider.

Data Breach Comic

Another hot topic of this week has been the investigation into the world of biometric skimmers by Kaspersky Labs. Much like credit card skimmers, biometric skimmers are designed to steal (and use) biometric information. ATMs are a particular target for these, as banks have started attempting to secure their ATM machines better by requiring user biometric information as part of their bank account log-in procedure. “The problem with biometrics is that unlike passwords or pin codes, which can be easily modified in the event of compromise, it is impossible to change your fingerprint or iris image,” Kaspersky Lab security expert Olga Kochetova commented in a statement announcing the results of their investigation. “Thus, if your data is compromised once, it won’t be safe to use that authentication method again.”

On a more positive note, Google announced the release of their new messaging app called Allo in a recent blog post. According to Google, Allo is a new “smart” messenger that makes it easier to make plans, find information, and express yourself. Part of Allo’s “smart” features is learning from the way you chat, then suggesting possible answers that you can tap on to use. This is very similar to the quick reply function in Google’s Inbox app, and appears to be taking advantage of DeepMind technology to do so. Allo is also serving as a preview platform for Google’s next generation of voice activated personal assistant software called Assistant, which also appears to take advantage of their DeepMind technology to create a voice activated system that you can have realistic conversations with.

On the flipside, Edward Snowden warns the public that they should not be using the Allo messenger if they are concerned about privacy, after Google changed a decision regarding the storage of Allo messages on their servers. Google had originally announced that they were not going to store Allo messages or any user identifiable information on their servers. However, they took this statement back by announcing that Allo’s unencrypted messages would be stored on Google servers after all. Snowden warns that this is probably so that the government can have access to user’s chats and information.

By Jonquil McDaniel

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing 

Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“.

Included (below) is an infographic discovered via the Alienvault Blog which highlights some interesting research findings.

  • Security professionals stated that they share threat intelligence with trusted peers (56%), internally (47%), with government agencies (28%), publicly (18%) and with crowdsourced/Open Source platforms (15%).
  • The largest jump has been in the adoption of crowdsourced platforms for threat intelligence sharing, which increased by almost five times since last year. This trend will continue to escalate as confidence in threat sharing platforms increases and as the trusted peer groups of security professionals expands.


The nature of the security industry has been extremely secretive, so it’s very encouraging to see that more people are utilizing different sources and are willing to more openly share threat intelligence,” said Javvad Malik, security advocate at AlienVault. “Malicious criminals innovate quickly, and the more our industry can achieve a similar level of agility through cooperation and collaboration, the more we can create a powerful collective defense against today’s advanced threats. Public threat intelligence sources, such as AlienVault’s Open Threat Exchange, enable even the smallest IT departments to leverage the collective knowledge of a global network of security experts to better identify, respond to and mitigate threats. We hope to see continued trust in these sources…”

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration

In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation.

But what about when you move to the cloud?

Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right?

CloudTweaks Comic

Everything going well, your valuable data will be migrated without a hitch and will be at your fingertips just in case legal or compliance issues arise.

But what if it doesn’t? What if, when you go to pull-up company records, your data is corrupted or not there at all?

That’s when the headache starts. Your legal team starts knocking on your door, compliance officers look to point their fingers at one of your team, and you face a hefty fine for data spoliation.


As much as I’d like to say I’m painting a dystopian picture that has very little foothold in reality… that’s just not the case.

Just ask UBS Warburg, West and Phillip Morris.

Now, I’m not an expert on all things data migration, but I do know a thing or two about the backbone of corporate communications: email.

Seemingly innocuous, email is the kind of thing many don’t tend to think much about. You send, receive, agonize over and trash thousands of emails a year. But it’s just email right? How difficult can it be to migrate it to a new cloud service?

The truth is, it’s pretty darn difficult.

Sure, there are lots of email migration vendors out there, waving their hands in the air and jumping up and down saying: “Pick me! Pick me!” (full disclosure: I work for Fookes Software and our product Aid4Mail is right there jumping and waving with the best of them). But how many of them can you really trust?

The fact is, converting email accurately is incredibly complex and we’ve seen very few vendors actually do it well.

Here are just some of the issues we’ve seen come up with poorly converted emails, all of which could result in data spoliation sanctions:

  • Entire folders of emails skipped because of a few special characters in the folder name
  • Unable to render special characters or character based languages (like Chinese, Arabic and Hebrew)
  • Lost attachments
  • Alteration of the SMTP header, this means:
    • Loss of original sent, received and stored dates
    • Loss of email addresses
    • Loss of status information (read, unread etc)
  • Emails being skipped as they’re too large

We even have an example for you:



And here’s another one:



So to put this into context, let’s say you produce consumer electronics. You’ve just launched a flagship device after a few years of planning and development. Everyone’s thrilled!

BUT there’s an issue with the battery. It overheats and catches fire in certain circumstances.

A few of your customers’ houses burnt down, a couple of cars caught on fire and around 20 people suffered from burns.

One of the burn victims has leaked some inside information, and now they want to sue you for negligence. The plaintiff is saying you knew about the battery issue and chose not to do anything about so as not to jeopardize the launch.

You’re not worried, you can prove that no one knew anything about it. So, you go back into your archives to pull up all the relevant communication between the project team and your Chinese battery supplier.

That’s when you see that all the emails between the China-based purchasing manager and the battery supplier are all question marks and blank spaces.

The sent date is showing as after the received date and all the emails look like they’re unread.

This, my friends, is data spoliation. Sure it’s not your fault, but you’ll still get sanctioned.

So, what’s the moral of this cautionary tale? Test, test and test again before you choose ANY migration application to move your email to the cloud.

Taking the time now to thoroughly test the application in all scenarios before you commit will pay off in the long run.


katie-cullen-montgomerieBy Katie Cullen Montgomerie

Katie is the marketing and communications manager for Fookes Software, the developers of email migration software Aid4Mail.

Four Tips For Better Information Security In The Cloud

Four Tips For Better Information Security In The Cloud

Information Security

Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data to it. Unlike the early days of cloud, now, there is wider acceptance that cloud-based data can be as secure as on premise and, in some cases, perhaps even more so. Nonetheless, this doesn’t mean businesses can be complacent about cloud security. Stringent governance, risk and compliance is needed to keep information secure.

There can be no doubt that the public cloud services market continues to grow. Gartner forecasts it will reach $204 billion in 2016 – a more than 16 percent growth on 2015. A RightScale survey revealed that Amazon Web Services are in use by over half of the questioned IT professionals and enterprise workloads continue to move to both public and private cloud with more enterprises now running more than 1,000 virtual machines. Furthermore, the survey revealed that security has now been overtaken by a lack of resources or expertise as the number one cloud challenge.


This last point is highly significant. What was once a detractor could soon be a reason for migrating to the cloud. Gartner has predicted that security will become a primary reason for cloud take-up by government; big players such as Amazon, Microsoft and Google, points out research director Neville Cannon are able to invest more than most government agencies in state-of-the-art security.

As information becomes a strategic and competitive asset for tomorrow’s digital organizations, information security will become a bigger business priority in the years to come, regardless of the infrastructure, applications and data storage options deployed. Digital organizations cannot afford the business and reputational damage of a leak, hack or loss of information. To protect and preserve business data and reputation when using the cloud, it is imperative that businesses get the following four aspects right:

1. Separation of data

While multi-tenancy has been the mainstream cloud architecture, isolation of client data and applications is an increasing imperative. Multi-instance is therefore gaining ground as a cloud storage solution that separates company data.

For cloud service providers, managing customer expectations around the segregation of sensitive data can be a challenge. Today’s businesses have a higher level of understanding when it comes to specific controls around data access, storage and retrieval and managing network stack requirements.

Happily, virtualization technology now enables complete applications to be encapsulated in a virtual container with performance preservation and security isolation. This makes achieving multi-instance architecture simpler. It also allows for significant gain in terms of economies of scale and cost while preserving the data segregation principle across customers.

2. Access

Robust identity management is essential for the business to retain control over the type of access its users have. This includes strictly enforced processes for managing updates within the organisation, such as personnel responsibility changes. Such changes can impact the data and applications that team members need access to – and those that they don’t.


The cloud service provider should be able to track who accesses what and when and provide this information for early intrusion detection. This is a basic requirement and as such a robust authentication and authorization framework compatible with single sign on and active directory is now the entry-level standard. Advanced identity management tools such as Cloud Access Security Broker (CASB) are also now available to ensure management of access control between on-premises and cloud applications.

3. Regulatory compliance and data protection

The General Data Protection Regulation (GDPR) comes into force in 2018 in the EU. This will impact how businesses use and share customer data. Yet a study by Blue Coat Elastica Cloud Threat Labs found that 98 percent of analyzed apps aren’t GDPR ready and, shockingly that 12 percent of ‘broadly shared documents and files contain regulated information and confidential data such as source code and legal information.’

The government-wide Federal Risk and Authorization Management Program (FedRAMP) has clearly defined considerations for storing data on cloud. Increasingly, compliance with the Federal Information Security Management Act (FISMA) is becoming mandatory to do business and industry specific compliances such as HIPAA are gaining ground.

Companies remain responsible for regulatory compliance regardless of whether they own and manage their own IT infrastructure and storage solutions or use the services of a cloud provider. Organizations need to be aware of the type of data they hold and all relevant compliance considerations that may apply to it, for example protected personal information and financial information.

While specific demonstrations of compliance vary according to the compliance ability, it needs to be clear within the cloud service provider agreement the measures that the provider has in place for compliance.

4. Business continuity management

As organizations become globalized and inter-dependent, their ability to continue business 24X7X365 is one of the essential needs. Hence, companies should insist on a business continuity plan and periodic test assessments from the cloud service provider. Generally, this is established practice, as is providing proof of business continuity exercises every quarter. SSAE16 certification – the auditing standard for service organizations – covers some part of this.

Cloud storage and applications provide compelling business benefits around cost savings, efficiency and collaborative working. Companies dependent on cloud service providers for the integrity and security of their data need to have complete confidence in their provider. This means shared and agreed risk management processes that will help preserve and protect the security of the company’s information and safeguard the integrity of its operations.

By Vibhav Agarwal

Cloud Adoption Goes Mainstream

Cloud Adoption Goes Mainstream

Cloud Mainstream

Cisco has just released the results of a global study which reveals that cloud adoption has hit the mainstream, but unfortunately, many organizations aren’t yet fully exploiting the many benefits of cloud. The study suggests that approximately 68% of organizations are helping drive business outcomes through cloud, an incredible 61% increase since last year’s study. And it appears that cloud-native applications are encouraging this intensified cloud adoption with cloud-based solutions such as the Internet of Things (IoT) and security playing a significant role.

The Need for Development of Cloud Strategies

With findings that 69% of organizations are without mature cloud strategies and just 3% with optimized cloud strategies that generate enhanced business outcomes it’s clear that the development of cloud strategies is necessary. Annual benefits per cloud-based application for organizations with the most advanced cloud implementations are in the range of $3 million in extra revenues and a further $1 million in cost savings, and revenue increases are chiefly due to new product and service sales, accelerated sales into new markets, or the more rapid development of new customer bases.

Hybrid IT Environments

Further results note that 95% of top achieving organizations with optimized cloud strategies have implemented hybrid IT environments which make use of multiple public and private clouds that are based on location, economics, and governance policies. In the Cisco-sponsored InfoBrief developed by International Data Corporation (IDC), Cloud Going Mainstream: All Are Trying, Some Are Benefiting; Few Are Maximizing Value, IDC recognizes five levels of cloud maturity: ad hoc, managed, opportunistic, optimized, and repeatable.


Korea, Japan, and China exhibit the greatest percentage of organizations using a mix of public cloud and private cloud services, but hybrid cloud adoption isn’t far behind in many other countries. Germany falls a little short of the top three at 51% hybrid cloud adoption, both Canada and Latin America Region present at 47%, the UK at 46%, and the United States at 45%. The Netherlands, France, and Australia aren’t far behind, settling in the low 40s.

Optimizing Cloud Strategies

Addressing the reasons behind why the majority of cloud strategies aren’t yet fully matured, the study observes various obstacles faced by organizations hindering greater cloud development. These include skill and capability gaps, legacy siloed organizational structures, a lack of well-defined cloud blueprints, and Information Technology/Line of Business misalignment.

Says Scott Clark, Vice President of Advanced Services, Cisco, “Our customers are dealing with increasingly diverse and complex environments as their hybrid and multi-cloud deployments grow. These customers want the freedom to choose the best environments and consumption models for their traditional and cloud-native applications, which all drive a variety of business benefits. Yet, as this research bears out, while many customers are embracing cloud, most are still in the early stages of their journey to an optimized cloud model. That is where our new and enhanced Cisco Professional Services can help. Working with our partners, our joint services offerings are designed to help customers achieve a highly secure and optimized cloud environment specific to their unique business needs.”

In an effort to help organizations optimize their cloud strategies, Cisco has launched their new set of Cloud Professional Services as well as released the Cisco Business Cloud Advisor Adoption Report. With the Cloud Professional Services including a host of new tools such as multi-cloud management and orchestration services, Cloud Acceleration Services, and IT transformation services for DevOps, as well as improved application and cloud migration services, Cisco endeavors to aid businesses in the enhancement of their cloud environments. The Business Cloud Advisor Adoption Report, a tool to be offered to Cisco partners to use with their customers, provides further assistance by rendering these latest findings into personalized analysis and direction. Richard Scannell, President and CEO of RiverMeadow Software, suggests, “In a complex multi-cloud world, customers require choices on the environments and consumption models for their cloud workloads.” Cisco and its partners are collaborating streamline this exercise.

By Jennifer Klostermann

New Self Driving Car Is All Smiles For Pedestrians

New Self Driving Car Is All Smiles For Pedestrians

New Self Driving Car

Would you feel safer crossing the street if self driving cars smiled at you? A Swedish engineering firm is testing this concept with the first smiling self driving car. The smile, which appears on the front grille of the vehicle, is a signal to let pedestrians know that the car sees them and that it is safe to cross the street.

It is predicted by Business Insider that by 2020 there will be over 10 million self driving cars on the road. In a survey conducted by Semcon, it was found that 8 in 10 pedestrians look out for eye contact and body language from drivers to determine whether or not it is safe for them to cross the street. 47% of these pedestrians also answered that they do not trust self driving cars, possibly due to this lack in eye contact and body language. Only 15% of those respondents had faith that self driving cars would stop to let them pass. Semcon also produced a video of a car that was rigged to appear like it was self driving so they could record the responses of pedestrians. Many of them appeared angry or startled when the car approached them.

While it is certainly impossible for self driving cars to make eye contact with a pedestrian, Semcon still sought a means by which to let pedestrians know that self driving cars see them. Karin Eklund, who is responsible for User Experience at Semcon, commented that “A lot of the discussions regarding self-driving cars are about the car’s technology. But how these vehicles will interact with unprotected road users is just as important. Self-driving cars need to communicate in a way that feels familiar and creates trust.”

Thus the concept of the smiling self driving car was born. Every time the car’s sensors detect a pedestrian in front of them, they send a signal to a display in the front grille of the car that activates a lighted smile. This lets the pedestrian know that the self driving car sees them. The Smiling Car also has a rear screen that is capable of letting the cars behind it know why it has stopped. Karin Elund also commented that “the strength behind The Smiling Car is that we allow people to communicate in the way they are used to, instead of taking an unnecessary detour via technology.”

Semcon is not stopping there, though. They are also refining the Smiling Car’s eye tracking and laser technology, which they call Lidar. Lidar will be able to conduct a more detailed analysis of the surrounding environment, such as detecting small head movements or reading pedestrians’ eyes. Semcon is hoping that this will make for much safer interactions between humans and self driving cars.

Along with the research institute Viktoria Swedish ICT and other auto industry partners, Semcon is hoping to create a new global standard for communication between humans and automated vehicles. “Today there are clear agreements on how cars must indicate when changing lanes. We now need to develop a common language for how self-driving cars will interact with pedestrians,” says Markus Granlund, president and CEO at Semcon.

By Jonquil McDaniel

Problem In Customer Support – What Mobile App Developers Can Learn From AmEx

Problem In Customer Support – What Mobile App Developers Can Learn From AmEx

Mobile App Developers

Peanut butter and jelly, salt and pepper, marketing and… customer support?

We don’t tend to consider customer support as a complement to marketing, but when an organization experiences success in retaining customers and securing customer loyalty, it’s likely they owe it to the two segments of business working together. Marketing, with all its bells and whistles, gets all the glory for attracting new customers, but customer service – good customer service — is the secret sauce that keeps the customers coming back – and bringing their friends and family with them.

If you’re reading this, you’re probably a marketer or involved with marketing in some respect, so it’s likely you already know about the concept of “customer segmentation” – the process of separating a customer base into groups based on specific demographics or company engagement. However, customer segmentation can also provide a big payoff through customer support. Segmentation enables customer support reps to deliver differentiated experiences to users, allowing organizations to adjust their approach and service level based on:

  • Customer lifetime value (actual or potential)
  • Recent purchase/transaction
  • App engagement and usage history
  • Customer support team size
  • Fluctuating ticket volumes

By segmenting customers by these factors, it enables companies to define distinct service-level agreement per segment and optimize resource allocation accordingly. For example, a company may have a 48-hour wait time for a lower-tier customer, but a two-hour response time for a V.I.P. Additionally, being able to access customer segmentation data in real-time enables businesses to appropriately route their users’ tickets. A lower-tier customer may get routed to a general hotline, while V.I.P.s get a dedicated concierge.


Most businesses deliver customer support based on the problem, routing customers to the right team or agent to address a given issue. But businesses that have taken a tiered customer group approach by focusing on the customer’s segment type have experienced happier customers and longer customer retention. Take American Express, for example. The financial institution aligned its help desk workflows with an eye for people, not problems. Over the last few years, the organization has created a tier of customers with a series of customer support services available to each. Its V.I.P. members expect V.I.P. service, whether they’re being notified of potential fraudulent activity or forget their password to their online account. By focusing on the customer first and the transaction second, American Express is able to deliver differentiated, higher-touch customer service to its highest value customers. The results speak for themselves: since shifting to a customer-centric model, the organization has been able to triple customer satisfaction, increase cardmember spend by 10 percent, and decreased its card member attrition by 400 percent.

When considering how to improve your customer retention and overall customer satisfaction, a natural first step is to start with changing the model for customer support to be customer-centric rather than problem-centric.

Here are some other things to consider:

  • Who are your most valuable customers?
  • Are you treating them differently than the rest of the pack?
  • Once you secure a customer, what’s the retention plan? Do you have one?

By aligning these elements with your overall marketing and customer support strategies, you’ll be well on your way to ensuring customer retention and loyalty.

By Barry Coleman, CTO, UserCare

barry_colemanBarry Coleman is CTO at UserCare, an in-app customer service solution that uses Big Data to help companies grow lifetime value by blending real-time support with relationship management.  Prior to UserCare, Coleman served as CTO and vice president of support and customer optimization products at ATG, which was acquired by Oracle for $1 billion. Coleman is the author on several patents and applications in the areas of online customer support, including cross-channel data passing, dynamic customer invitation, and customer privacy. He holds a B.A. in Artificial Intelligence from the University of Sussex.

IBM Advancing Hybrid Cloud with AI and Cloud Ready Servers in Mind

IBM Advancing Hybrid Cloud with AI and Cloud Ready Servers in Mind

IBM Advancing Hybrid Cloud

IBM has just announced the introduction of new systems and solutions for the cloud with their latest offerings allowing clients to capitalize on private cloud environments as they simultaneously utilize the IBM Cloud for balancing of workloads necessary due to shifting business demands. Included in their cloud-ready offerings is a new line of Power Systems for IBM Cloud which incorporates integrated solutions that enable clients to extend workloads to the IBM Cloud, and IMB Spectrum Protect with new performance optimization for cloud storage pools. Providing a complete hybrid cloud strategy, IBM promises advanced hardware solutions along with IBM Cloud in an effort to help businesses get the most from technological infrastructures.

In a statement to CloudTweaks, says Scott Crowder, CTO & Vice President, IBM Systems, “The shift to cognitive and cloud will have huge implications for IT. In order to pull meaningful insight out of data, businesses need IT infrastructure that can handle the data and processing requirements of new cognitive technologies. In order to take meaningful actions based on those insights, businesses need IT infrastructure that can integrate rapidly-created applications built in the cloud with core enterprise business processes and data. IBM today introduced on-premises offerings designed for hybrid cloud environments, delivering new infrastructure that is optimized for Big Data and cognitive workloads.”

The Hybrid Cloud Era


(IBM Edge – Photo by IBM)

Recognizing business’ investment in cloud technologies across all industries for its improved efficiency, greater innovation, and effortless growth, IBM asserts that clients are looking for a blend of private cloud, public cloud, and traditional IT platforms, and so has developed new solutions to progress hybrid cloud integration. Launched at IBM Edge in Las Vegas this week, the new IBM cloud-ready systems, services and solutions simplify data movement, services, and applications across hybrid cloud environments. Says Tom Rosamilia, senior vice president, IBM Systems, “Today’s business environment is very dynamic and filled with disruption. A hybrid cloud model enables clients to continuously adapt while also optimizing on-premises investments. IBM is uniquely able to support the flexibility clients need across IBM Systems and the cloud.

A recent survey found that the majority of the highest performing organizations measured utilize integrated or highly coordinated cloud initiatives and 92% of respondents stated that the most successful cloud projects allowed for the creation and support of new business models. However, even as cloud use expands, it’s expected that 45% of workloads will remain on dedicated on-premises systems. To this end, IBM’s new system offerings have been designed specifically for hybrid cloud:

  • IBM Spectrum Copy Data Management and Protect encourages the agility and efficiency of operations and development through detailed but user-friendly management of data copies.
  • Power Systems for cloud, with integrated OpenStack-based cloud management and elastic consumption models help customers transform IT infrastructure to a local cloud for IBM I, AIX, and Linux workloads.
  • z Systems for cloud, a SaaS-based solution, aids users in better application and business decision making through trend data and embedded expertise on real performance data.

An Open Ecosystem

But IBM hasn’t limited its contribution to proprietary solutions only; supporting open communities and standards, IBM ensures clients have access t o a wide range of choices in the creation of an inclusive cloud strategy that best addresses their own business and marketplace demands. New and expanded collaborations spanning local and public cloud environments include:

  • Joint engineering and deeper product collaboration with Red Hat.
  • NGINX’s application delivery platform now supporting servers based on IBM’s POWER architecture.
  • Hortonworks, one of the world’s leading big data platforms, is entering the marketplace with IBM to sell Hortonworks Hadoop distribution on POWER.
  • The Canonical and IBM hybrid cloud partnership is expanding as Canonical makes Ubuntu OpenStack available on LinuxONE, z Systems, and Power Systems.
  • IBM and Mirantis collaboration is set to develop reference architectures which allow Mirantis OpenStack to manage compute nodes hosted on IBM Power System servers, as well as validate many core applications to run its OpenStack private cloud.

With this array of new and advanced solutions, as well as many attractive collaborations, the hybrid cloud market continues its dynamic progress.

By Jennifer Klostermann

CloudTweaks Comics
The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Timeline of the Massive DDoS DYN Attacks

Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…



Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…


Sponsored Partners