Enterprise users of public cloud welcomed Amazon Web Services' new products and price reductions,but said that additional features such as better security,ease of use and added multiple-availability to overcome outages issues could make ...
Tags: Gov-cloud, Amazon Web Services, security, cloud services
South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data. ...
Tags: South Carolina, IRS, malware, 7-Zip to compress information
NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a"large"number of people was recently stolen. Agency employees were told of the October 31 theft of the ...
Tags: NASA, Encrypt Laptops, Laptop, sensitive data, personal information
MPs have told Home Secretary Theresa May that the Communications Data Bill represents a huge invasion of privacy that could be exploited by criminals. May appeared in front of the Commons Select Committee scrutinising the controversial ...
Tags: MPs, Home Secretary, Communications Data Bill, Data security
Most organisations are failing to put the necessary protections around data in virtual environments, leaving them wide open to attack, says Jason Hart, vice-president cloud solutions, SafeNet. "In the virtual world, the basic security ...
Tags: necessary protections, data, virtual environments, confidentiality
The UK’s Draft Data Communications Bill – aimed at making it easier for authorities to spy on electronic communications – will be ineffective against terror, says the Information Commissioner’s Office. Information ...
Tags: Draft Communications Bill, electronic communications, Wales, encrypt
The UK's Draft Data Communications Bill–aimed at making it easier for authorities to spy on electronic communications–will be useless and quite dangerous if enacted,says Wikipedia founder Jimmy Wales. "It will force many ...
Tags: UK, Draft Data Communications Bill, electronic communications
Police across Europe could soon find themselves monitoring Facebook,Google and Twitter for content related to terrorism. A leaked report about a"Clean IT"initiative by the European Union(EU)revealed the plan for police officers ...
Tags: EU, monitor web, police, Wikipedia
Security firm CertiVox has launched PrivateSky for Outlook that enables users to encrypt messages and large files up to 5GB. The security software adds a single button to the sender's Outlook email console to enable them to send and ...
Tags: CertiVox, Outlook, security software, PrivateSky
The US is collecting huge amounts of data on its citizens, according to former National Security Agency (NSA) official Bill Binney. While at the NSA, Binney led the development of secret software he now believes is being used to carry out ...
Tags: NSA, Bill Binney, secret software, illegal data
Mobile device management (MDM) is not about security, according to Eric Green, senior vice-president of business development at security firm Mobile Active Defense Partners. "There is no security in MDM; its ability to secure a device is ...
Tags: MDM, BYOD, ISC, Eric Green, mobile security
When I first encountered the SpiderOak backup-service a few years ago, I found myself imagining that a marvelous alien species had designed it to teach us about their culture. Its a little more explicable these days, even as the company has ...
Tags: datastorage, backup-service, Online Storage, Internet service
Wikipedia founder Jimmy Wales has slammed as"technologically incompetent"the Draft Data Communications Bill,which will make it easier for security and police services to spy on e-mails,phone calls and internet activity of UK citizens. ...
Tags: Wikipedia, Jimmy Wales, slams draft communications data bill, ISPs
Close your eyes and think of the cloud.Odds are Amazon quickly comes to mind--for good reason.By some estimates,Amazon Web Services holds 70 percent of the IaaS(infrastructure as a service)market,providing compute,storage,and networking ...
Tags: IaaS provider, HP, Microsoft, Google, Amazon
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application