Internet privacy in Europe is becoming far more complex as companies implement the European Unions’ web privacy law on data collection.Read More
In the wake of the killing of al-Queda leader Osama bin Laden earlier this month, many officials from several Western countries are on high alert for any reprisal attacks – particularly in the form of cyber terrorism.Read More
According to a recent study conducted by VanDyke Software and Amplitude Research, security managers are worried about how employees use social media.Read More
While the application of cloud computing in enterprise environments has been well explored in recent years, talk of the technology on the consumer front has been relatively quiet. However, the trend of cloud development for consumers is beginning to accelerate as more services are introduced. At the Cloud Connect event in Santa Clara, California, Cisco…Read More
I’m constantly annoyed by how broad the term “cloud” can be, and I try to use IaaS, PaaS, and SaaS instead, but even these categories are blurring at the edges. The bottom line is that if it’s hooked up to the internet, it can be controlled from a central location, and it scales up and down on demand, it’s in the cloud.Read More
2010 – Year of the Zombie Cloud? 2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware that brings it under the remote control of a…Read More
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at Congress, this four-part series will summarize some of the most popular sessions at the event.
Photo Courtesy of Scubadive67 from Creative Commons Cookies aren’t just a delicious treat with milk. Cookies are text files that are created when users visit websites. They store information such as shopping cart contents, registration or log in credentials, and user preferences. When a user returns to a website, a cookie provides information and allows…Read More