In the hopes of creating better data protection and security across the United States, President Barack Obama has signed an order that promotes more information sharing between private companies and government entities.Read More
In last week’s post, Protecting your resources with AWS Identity and Access Management, Justin covered the basics of AWS Identity Access Management (IAM). This week, we’re going to take a look at password policies and multi-factor authentication using IAM. Password Policies The value of a strong passwords is well known. Most organizations already have a password…Read More
Information technology departments across the world have been starting to collect big data to improve how the company works, but there are some data protection concerns that go with this method of data hoarding, according to a recent analysis by Ovum.
Big Cloud Security News If you are using cloud computing, some major news just came out. PCI released the DSS Guidelines for Cloud Computing on Feb 7th. This is really important because the new document provides “guidance on the use of cloud technologies and considerations for maintaining PCI DSS controls in cloud environments.” While it’s…Read More
In an effort to make sure information is kept safe, the European Union has launched a new cyber data protection plan that they hope will help the internet stay safe and grow across multiple countries.
The recent attacks on the New York Times; Washington Post and Federal Reserve illustrate a dangerous trend in cyber tactics. All of these institutions became victims of Island Hopping. Island Hopping has become the tactic of choice for elite hacker crews. As an information security specialist your organization is being targeted by nation states; criminals…Read More
Over the next several weeks, we will be discussing best practices for securing your Amazon Web Services (AWS) environment. Before we dive into securing your instances, applications and data, we have to start from the top. As part of the AWS shared responsibility security model, consumers of AWS play a significant role in securing their…Read More
By Shannon McCarty-Caplan I’m an idiot. Recently, I received a direct Twitter message from my one of my closest friends late one night. It said, “did you see this picture of you lol” and included a shortened web link. Considering that my friend is a photographer who I know has photos of me, it wasn’t strange…Read More
The jailbreaking of Apple iOS devices has been around as long as the devices themselves, but IT managers are still underestimating the scale of the issue and the security risks it represents for corporate data and networks. The latest jailbreak for iOS 6.1, released on 4 February, was downloaded by a whopping 5 million users…Read More
For industries like healthcare, there is no doubt cloud computing can be a positive force if done correctly. Cloud-based electronic health record, for example, can give doctors a better ability to access records quickly, understand their patients and more easily diagnose diseases.