The lowdown on the UK government’s new Cyber Essentials Scheme

Recognising that not all organisations have adequately dealt with cyber security, the UK Government has recently developed a Cyber Essentials Scheme which aims to provide clarity on good cyber security practice.

In its Cyber Essentials Scheme, the UK Government sets out five controls which it is hoped will provide all types of organisations with basic protection against the most widespread type of Internet threats. As such, the Cyber Essentials Scheme should be viewed as a form...

By William Long, 08 July 2014, 0 comments. Categories: Europe, Legal, Security.

Code Spaces RIP: Code hosting provider ceases trading after “well-orchestrated” DDoS attack

Code Spaces, the web-based SVN and Git hosting provider, has ceased trading after revealing a devastating DDoS attack which wiped its cloudy data would cost too much to both resolve and keep the company going.

The unauthorised user gained access to the company’s EC2 control panel, created a series of backup logins and randomly deleted items to the extent where most of Code Spaces’ data had disappeared, with no backups in place. The attacker had also demanded a large sum of money to stop the DDoS,...

By James Bourne, 19 June 2014, 0 comments. Categories: DisasterRec, Security.

One in three cloud services was susceptible to Heartbleed, research shows

One third of cloud services was vulnerable to the debilitating Heartbleed virus, it has been revealed.

The findings were posted in a research paper from cloud security provider Skyhigh Networks’ Cloud Adoption & Risk report, and found that 1,173 cloud services from the 3,571 in use had left data exposed by Heartbleed when the bug first broke.

Skyhigh reports that the number of vulnerable services was less than 1% a week later following cloud providers stepping in to address the breach. However there...

By James Bourne, 12 May 2014, 0 comments. Categories: Security.

Healthcare cloud security: Now and into the future

By David Linthicum

Healthcare providers and payers that utilize cloud platforms to store and access personnel records (and like data) are probably storing protected health information (“PHI”), which is protected by the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). Rules now in place govern the use of cloud computing to store health-related data, including personnel-related data.  The consequences for failure to comply can be severe to a company’s...

By LogicWorks, 11 April 2014, 0 comments. Categories: Data, Government, Security.

Six of the best: Scams, shams and snoopers

The latest edition of CloudTech’s look at the best links from around the web has a slightly nefarious tint to it, with stories of scammers, snoopers and sham artists. Thankfully though, there are some good news stories further down, proving good things come to those who wait.

1)  Beware: The cloud’s Ponzi schemes are here [Infoworld]

David Linthicum, writing for Infoworld, sheds light on an announcement...

By Cloud Tech, 07 April 2014, 0 comments. Categories: Data, Editorial, Security.

The Affordable Care Act and cloud computing: Understanding the links

The Affordable Care Act (ACA) aims to reduce costs while improving quality of care.  Of course, those in Healthcare IT have been trying to reduce costs and improve care for years.  Perhaps there are some real opportunities to improve IT delivery around the ACA, and those opportunities may exist more in cloud than traditional approaches.

Delivering high-quality clinical care is impossible without the support of strategic, integrated,...

By LogicWorks, 03 April 2014, 0 comments. Categories: Hype, Industry, Security.

Why protecting encryption keys is critical to keeping cloud data private

The changing regulatory and compliance environment around data privacy necessitate improved methods of protecting sensitive information sent to the cloud.

Encryption is one strategy cloud service providers use to protect enterprise cloud data from cybercriminals and any unauthorized access.

Cloud Data Encryption mathematically transforms data so that it is undecipherable without the “key” that can be used to change the data back to its original form.

For a variety of reasons, enterprises often...

By cloudbestpractices.net, 20 March 2014, 0 comments. Categories: Data, Security.

Demand for data sovereignty puts home grown data centres in the spotlight

By Simon Taylor, co-founder, Next Generation Data

The continuing revelations by former US National Security Agency employee Edward Snowden about the extent of data surveillance are rumbling like thunder around the cloud computing industry.

This is likely to be more than just a passing storm in a tea cup as there could be lasting repercussions on where cloud users and providers store their data.

Companies, governments and the European Parliament are starting to take a long hard look at the whole issue of data...

By NGD, 11 March 2014, 0 comments. Categories: Data, Europe, Opinion, Security.

The outlook for privacy and data protection for cloud in 2014

2014 is likely to prove to be a big year in data protection for many industries - none more so that the cloud computing industry with the possible adoption of the EU’s proposed Data Protection Regulation, implementation of European cyber security strategies and moves by Germany and France to set up a European Communications Network.

In a recent weekly podcast, German Chancellor Angela Merkel suggested a European Communications Network should be set up to avoid potential access to data by the U.S....

By William Long, 06 March 2014, 2 comments. Categories: Analysis, Data, Legal, Security.