May 4, 2023
Via: CIOIn the first use case of this series, Stay in Control of Your Data with a Secure and Compliant Sovereign Cloud, we looked at what data sovereignty is, why it’s important, and how sovereign clouds solve for jurisdictional control issues. […]
Deployment Models, Hybrid Cloud
February 24, 2023
Via: eWeekSoftware company Theta Lake, which specializes in unified communications (UC) compliance and security, recently conducted its annual benchmark survey late last year to understand how communications platforms are being used and which issues organizations are struggling with the most. More […]
Deployment Models, Public Cloud
January 12, 2022
Via: TechRadarUS mobile carrier T-Mobile has revealed that a bug in iOS 15.2 prevented some of its customers from using iCloud Private Relay on their iPhones when using cellular data. First introduced by Apple with the release of iOS 15, iCloud […]
December 9, 2021
Via: InformationWeekFeeling edgy? So are some cloud providers, as they watch edge data centers cut into their market. Edge data centers offer many advantages, including reduced latency, increased bandwidth, and enhanced privacy, security, and resiliency. But does this mean that cloud […]
March 23, 2021
Via: Threat PostArts-and-crafts retailer Hobby Lobby has suffered a cloud-bucket misconfiguration, exposing a raft of customer information, according to a report. An independent security researcher who goes by the handle “Boogeyman” uncovered the issue and reported it to Motherboard in an online […]
December 8, 2020
Via: ArsTechnicaFor more than three decades, the Internet’s most key underpinning has posed privacy and security threats to the billion-plus people who use it every day. Now, Cloudflare, Apple, and content-delivery network Fastly have introduced a novel way to fix that […]
Deployment Models, Public Cloud
September 22, 2020
Via: Threat PostSix percent of all Google Cloud buckets are misconfigured and left open to the public internet, for anyone to access their contents. In a survey of 2,064 Google Cloud buckets by Comparitech, 131 of them were found to be vulnerable […]
September 9, 2020
Via: ZDnetThe global pandemic has sent 92% of organisations scurrying to adopt new technologies in order to facilitate remote work, but businesses in Asia-Pacific often come up short on cloud expertise and endpoint controls. Such common oversights can leave these companies […]
April 2, 2020
Via: Threat PostKey Ring, creator of a digital wallet app used by 14 million people across North America, has exposed 44 million IDs, charge cards, loyalty cards, gift cards and membership cards to the open internet, researchers say. The Key Ring app […]
October 22, 2019
Via: ZDnetThe European Data Protection Supervisor (EDPS) says it has “serious concerns” over Microsoft’s contracts with European Union institutions and their compliance with European data-protection laws. EDPS, Europe’s top privacy body, on Monday said recently amended contractual terms between Microsoft and […]
November 5, 2018
Via: CompareTheCloudThe utility of the cloud, however, is largely undermined by its architecture – the servers storing data are, after all, centralised. The fact that a single business controls these raises certain privacy and security concerns, particularly at a time where […]
November 30, 2016
Via: CompareTheCloudNo-one knows which form Brexit will take, and there are many possibilities, so its impact on the wider public sector in the four nations of the UK is hard to pin down. That means government policy on everything from borders […]
Deployment Models, Private Cloud
October 4, 2016
Via: CompareTheCloudSecurity and management in particular continue to be pain points. Many arrive with the assumption that in a private cloud, IT departments have more control so the environment will either inherently be more secure, or will be easier to implement […]
May 25, 2016
Via: Russel EdwardsThe simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations […]
May 6, 2016
Via: Microsoft Server and Cloud Platform BlogIt is absolutely true that the cloud is rapidly becoming the mode of choice for IT operations. My colleague Rick Villars wrote that we’re just a couple years away from cloud overtaking traditional datacenter implementations and becoming the predominant infrastructure […]
February 18, 2016
Via: Network World Cloud ComputingThere is Software-as-a-Service, Disaster Recover-as-a-Service, SECurity-as-a-Service. What’s currently missing, and the crux of much cloud-profiting malaise, is PRiVacy-as-a-Service. Cloud Access Security Broker (CASB) software, something that’s in the lab right now, does a great job of things like infiltration/exfiltration (read: […]
Deployment Models, Private Cloud
February 9, 2016
Via: InfoWorld Cloud ComputingCloud providers and users are facing a real dilemma: The Safe Harbor agreement between the United States and European Union was struck down in October by EU courts, and a new agreement under review to replace it may not provide […]