Cloud Security: 8 Things You Need to Know When Choosing a Storage Service

When you decide to start using a cloud storage or online backup provider, you may have some worries about security: we’ve all seen the sensational headlines about starlets having naked pictures of themselves stolen from their online accounts. The power that the U.S. Senate has recently granted to ISPs may also inspire worry. Read about […]

What the Cloudbleed disaster says about the state of internet security

Read Nick Ismail’s article about how Cloudbleed bug caused a data leak on Information Age : Last month, Cloudflare, a web content delivery network, revealed that a security bug had caused sensitive data to leak from its customers’ websites.The security bug, or Cloudbleed, was found in a part of the Cloudflare system that powered vital […]

Security Priorities and Multi-Cloud Migration – What to Secure First

Read Oliver Pinson-Roxbrough make a case for multiple cloud migration on Infosec Magazine : There is no shortage of news on public cloud adoption trends in our industry, but what isn’t regularly making the headlines is the trend towards multi-cloud adoption. Industry experts and analysts like Gartner recommend standardization on multiple IaaS cloud service providers as a […]

Can the cloud save the NHS from a data breach epidemic?

Read Nick Ismail’s article on whether adopting cloud services could safeguard healthcare organisations from data breaches on Information Age : The National Health Service (NHS) and associated organisations are a lucrative target for cyber hackers, with reports suggesting that medical records are 100 times more valuable than stolen credit card details. Read his full article […]

Cloud adoption in the UK jumps another 5 per cent

The overall cloud adoption rate in the UK now stands at 88 per cent, according to a new report by the Cloud Industry Forum. The report also states that there has been a 5 per cent increase year-on-year, and an 83 per cent increase since 2010, when the first stats were taken. Read about the […]

Aligning physical and digital security in the Cloud

Read why Julian Lovelock says that important to align physical and cyber security in the cloud on Source Security : Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. Read his full article here.

5 Ways To Protect Your Cloud Service From Being Hacked

Following the recent Wikileaks leak, and the revelations that companies like Apple Inc Alphabet Inc and Cisco Systems, Inc. are potentially vulnerable to hacking, cybersecurity has never been more important. Added to that many companies’ reliance on cloud services from places like Amazon.com, Inc. , and you can see how the issue can be compounded. Read […]

FOX13 Investigates: Protecting yourself from internet data breaches

Read Jim Spiewak’s article explaining the cloudbleed hack which affected Cloudflare on Fox13 : It’s being called the largest online security breach this year that no one has heard about. Personal information from thousands of websites has been floating around the web for anyone to view. Security experts said the scary part is you might not even […]

Here’s What You Need to Know About the Massive ‘Cloudbleed’ Data Breach

A huge data breach that may have exposed users’ private information and log-in details for thousands of websites was uncovered last week, in what looks to be the most significant internet leak of 2017 so far. Dubbed ‘Cloudbleed’ in reference to the notorious ‘Heartbleed’ breach in 2014, the leak stems from a bug found in code […]

CompuCom Survey: Risk of Data Breaches and Malware Injections Top Cloud Security Concerns

According to a new survey from CompuCom Systems, a leading technology infrastructure services company, the majority of IT professionals surveyed (36 percent) believe data breaches or malware injections pose the greatest risk to cloud security, more than account hijacking, insider threat or a number of other hazards. Read about the new survey by CompuCom Systems […]