4chan user reportedly hacks iCloud with nude celeb pics – as Google strengthens security

An anonymous hacker on the 4chan site has published a series of naked photos of more than 100 celebrities, including Jennifer Lawrence, Kate Upton and Mary Elizabeth Winstead, after reportedly hacking into the users’ iCloud accounts.

Even though the photos appeared to originate from iCloud devices – and even though 4chan users mentioned it – it’s not been confirmed that Apple’s cloud storage system provided the leak. Other theories are being banded about as to how the photos were...

By James Bourne, 01 September 2014, 3 comments. Categories: Compliance, Security.

Community health systems, HIPAA, and cloud hosting: The facts

On the heels of the recent Community Health Systems (CHS)  data breach, in which 4.5 million Personal Health Records (PHI) were compromised, the industry is abuzz about data security in the HIPAA Compliant cloud businesses.  Data breaches like the one at CHS are not the exception – they’re the norm.  The FBI warned that the healthcare industry is extremely vulnerable to hackers in a recent

By LogicWorks, 21 August 2014, 0 comments. Categories: Compliance, Security.

HIPAA, cloud, and your business: What you need to know

By David Linthicum

When it comes to HIPAA compliant solutions, security, and cloud adoption, what most find frustrating is how to sort the myths from reality.  The “addressable” requirements of the security rules tend to be the most difficult to meet.  Thus, these addressable requirements have a tendency to fall off the radar, and could therefore create issues with compliance.

Under the HIPAA Omnibus...

By LogicWorks, 31 July 2014, 0 comments. Categories: Compliance, Security.

Governance, public clouds, and MSPs: Creating a strategy

By David Linthicum

Governance is a loaded term.  In the old days of enterprise architecture, it meant the ability to yell at staffers who used the wrong operating systems and databases, thus enterprise architecture was more of a management concept.  These days, with the emergence of cloud computing, enterprise architecture is how we control, manage, and secure cloud resources and services.

Public clouds typically don’t exist on their own.  They have to work and play well with existing or even new...

By LogicWorks, 09 May 2014, 0 comments. Categories: Compliance, Strategy.

US judge orders Microsoft to give up overseas cloud data

A US judge has ruled that US-based providers must hand over customer emails even if they are stored in a location overseas.

The decision comes amidst a challenge from Microsoft with regard to an Ireland-based customer, claiming that as the US government does not have jurisdiction overseas the company should not be forced to disclose user data.

Yet Judge James C. Francis has dismissed this claim, further jeopardising the data security of US cloud providers.

Judge Francis explained the issue at stake....

By James Bourne, 29 April 2014, 0 comments. Categories: Compliance, Data, Legal, Microsoft.

Can managed services balance BYOD security and compliance concerns?

BYOD security is and has been a major point of interest (perhaps hype) in IT for some time now. The desire for employees to use their own smartphones and devices frames an opportunity for businesses to cut capital expenses and increase efficiency. Despite the potential upsides, and while there are many companies that have come to embrace such an approach, there are major hurdles where security and compliance are concerned.

As an added layer of complexity, many companies are also balancing the cloud and network...

By LogicWorks, 07 October 2013, 0 comments. Categories: Best Practice, Compliance, Enterprise, Vendors.

Cloud-enabling technologies revenue will reach $22.6bn by 2016

Defining Cloud-Enabling Technologies (CET) as those that are installed, delivered and consumed on-premises, Market Monitor a service of 451 Research recently released their annual forecast of virtualization, security and automation and management revenue through 2016. The report, Market Monitor Cloud-Enabling...

By Louis Columbus, 27 September 2013, 0 comments. Categories: Compliance, Economy, Industry, Infrastructure, Research.

How healthcare cloud computing can save millions as regulations change

By David LinthicumWe all know that cloud computing provides business agility.  For many enterprises, that means they have the ability to keep up with new and emerging markets.  In the world of healthcare, cloud computing also provides the ability to keep up with ever-changing regulations.

This double value that healthcare cloud computing brings is rather interesting, given that many in healthcare are suspicious of the value of...

By LogicWorks, 25 September 2013, 0 comments. Categories: Compliance, Industry, Strategy, Trends.

IBM introduces flexibility to Big Data governance

Tony Baer, Principal Analyst, Software – Enterprise SolutionsIBM’s latest Big Data enhancements for its InfoSphere integration and governance product portfolio promote an emerging approach to reconcile Big Data with master data management (MDM). IBM’s official terminology is “building confidence” in Big Data. The innovation is a probabilistic approach based on the idea that when ensuring the validity and sanctity of Big Data, “perfect is the enemy of good.” This is very much in...

By Ovum StraightTalk, 19 September 2013, 0 comments. Categories: Compliance, Data, Enterprise, Regulation, Strategy.

Before the breach: Cloud breach response best practices

One of the most difficult and damaging events that can occur for any business’ infrastructure is a breach. However, breaches occur when proper planning hasn’t gone into an infrastructure contingency plan.

There are several areas of consideration that need to be fully planned for before any IT strategy and data objectives can be balanced in the face of a potential breach: whether technical, HR, or compliance, have a response plan for each area is necessary before any problem ever arises.

In this...

By LogicWorks, 13 September 2013, 0 comments. Categories: Architecture, Best Practice, Compliance, DisasterRec, Security, Strategy.