Tag Archives: security policies

Cloud Services, Security Not Disparate Elements

Cloud Services, Security Not Disparate Elements With many organizations in the United States opting to access cloud services as an alternative to traditional technology infrastructure and equipment, vendors and businesses are continuing to emphasize practices and policies that help companies take advantage of cloud computing without undermining security. According to a recent report by Forbes,

Keeping Your Business Data Secure In An Insecure World

Keeping Your Business Data Secure In An Insecure World If you’re a small or medium-sized business (SMB), you might be hoping keeping your head down and staying off the Cloud will keep your data safe from interlopers — hackers and government agencies alike. Yet Verizon Communications’ 2013 Data Breach Investigations Report found 72 percent of

Cloud Computing 2014: Five Cloud Trends To Look For

Cloud Computing 2014: Five Cloud Trends To Look For

Cloud Computing 2014: Five Cloud Trends To Look For All tech giants are aiming at cloud computing as the cloud landscape is all set to dominate the technological world. As mentioned on NY Times, the biggest tech giants including IBM, Amazon, Microsoft, and Google are expected to invest $1 billion annually in cloud computing in

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,

The Lurking Threat of Bring-Your-Own-Cloud (BYOC)

The Lurking Threat of Bring-Your-Own-Cloud (BYOC)

The Lurking Threat of Bring-Your-Own-Cloud (BYOC) A few generations back, when the Internet was still an unknown commodity and inter-office mail came around in manila envelopes graffitied with the crossed-out signatures of every recipient that envelope had ever met, network security was largely an in-house affair with data tapes and mainframes playing a central role.