The survey also looked at attitudes towards cloud computing. While most respondents (95%) acknowledge the security risks associated with cloud …
Tag Archives: Security
Cloud computing security vector sketch icon isolated on background. Hand drawn Cloud …
Hand drawn Cloud computing security icon. Cloud computing security sketch icon for infographic, website or app. – Stock Vector from the largest …

Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web

Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. The post Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web appeared first on WIRED.
All articles
Crying ‘Wolf!’ seems to work for security
In the last few weeks, we’ve seen a lot of supposed mega hacks garner big media attention. And why not? We’re talking about more than 1 billion people at risk — if these breaches had been real and current. But that’s not the case.
The strange thing is that I’m not really upset about this. Normally, I get incensed when I see the media get security stories wrong. But the greater good in the security business counts for something, and it just may be that these overhyped breach stories led a lot of people to take the simple steps they need to follow to increase the security of their accounts.
The latest mega hack story that was misrepresented was the compromise of 117 million LinkedIn accounts. You can find stories about it on just about every major news site. Stories were posted on Facebook accounts. Clearly this must have been a significant hack that people needed to know about.
To read this article in full or to leave a comment, please click here
Talk Recap: Automated security hardening with OpenStack-Ansible
Today is the second day of the OpenStack Summit in Austin and I offered up a talk on host security hardening in OpenStack clouds. The video should …
Hacker High School Teaches Cyber Security Skills To Teens
IDG Contributor Network: IoT security will soon be common in the enterprise, Gartner says
A fifth of all businesses will have deployed IoT-related security by the end of 2017, analyst Gartner thinks.
Dedicated digital security services that are committed to “protecting business initiatives using devices and services in the Internet of Things” will be in place by then, the research and advisory company says.
Gartner made the statement in a press release on its website in relation to a security and risk management summit earlier this month in Mumbai.
‘Reshape IT’
“The IoT redefines security,” Ganesh Ramamoorthy, research vice president at Gartner, said in the press release.
To read this article in full or to leave a comment, please click here
Data-centric security: The new must-have
Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually …
Are your biggest security threats on the inside?
The now infamous Ashley Madison website has had a pretty successful run at helping its clientele be disloyal. So perhaps some would view it as poetic justice if the website became one of the most scandalous breaches in history at the hands of one of its own.
At least that is the conclusion of IT security analyst John McAfee, who noted recently “yes, it is true. Ashley Madison was not hacked – the data was stolen by a woman operating on her own who worked for Avid Life Media.”
If true, the fact that the Ashley Madison breach was due to an internal, and not external, threat shouldn’t come as too big a surprise. Many IT security studies this year have pointed to the growing threat of insider data theft and corporate breaches.
To read this article in full or to leave a comment, please click here
Computer Scientist Seeks Stronger Security Shroud for the Cloud
Dr. Zhiqiang Lin, of the Erik Jonsson School of Engineering and Computer Science at UT Dallas, is working to advance the field of cloud computing, …

NSA director just admitted that government copies of encryption keys are a big security risk
The director of the NSA, Admiral Michael Rogers, just admitted at a Senate hearing that when Internet companies provide copies of encryption keys to law enforcement, the risk of hacks and data theft goes way up.
The government has been pressuring technology companies to provide the encryption keys that it can use to access data from suspected bad actors. The keys allow the government “front door access,” as Rogers has termed it, to secure data on any device, including cell phones and tablets.
Rogers made the statement in answer to a question from Senator Ron Wyden at the Senate Intelligence Committee hearing Thursday.
Wyden: “As a general matter, is it correct that anytime there are copies of an encryption key — and they exist in multiple places — that also creates more opportunities for malicious actors or foreign hackers to get access to the keys?
Rogers: Again, it depends on the circumstances, but if you want to paint it very broadly like that for a yes and no, then i would probably say yes.”
View the exchange in this video.
Security researchers have been saying for some time that the existence of multiple copies of encryption keys creates huge security vulnerabilities. But instead of heeding the advice and abandoning the idea, Rogers has suggested that tech companies deliver the encryption key copies in multiple pieces that must be reassembled.
From VentureBeat
“The NSA chief Admiral Rogers today confirmed what encryption experts and data scientists have been saying all along: if the government requires companies to provide copies of encryption keys, that will only weaken data protection and open the door for malicious actors and hackers,” said Morgan Reed of the App Association in a note to VentureBeat.
Cybersecurity has taken center stage in the halls of power this week, as Chinese president Xi Jinping is in the U.S. meeting with tech leaders and President Obama.
The Chinese government itself has been linked with various large data hacks on U.S. corporations and on U.S. government agencies. By some estimates, U.S. businesses lose $ 300 billion a year from Chinese intellectual property theft.
One June 2nd, the Senate approved a bill called the USA Freedom Act, meant to reform the government surveillance authorizations in the Patriot Act. The Patriot Act expired at midnight on June 1st.
But the NSA has continued to push for increased latitude to access the data of private citizens, both foreign and domestic.
Google Says Google Drive Now Has 1 Million Customers, Improves Security To Get More
Prior to the ISO certification, Google Drive has been certified as compliant with the SOC 2 and SOC 3 security standards for cloud computing.
Global Cloud Database Security Software Market – By End User Industry, Vendors and Geography …
NEW YORK, Sept. 24, 2015 /PRNewswire/ — Proliferation of cloud computing in the market has been remarkable as benefits gained from cloud based …