Dropbox says password reset measures have worked following leak revelations

(c)iStock.com/KIVILCIM PINAR

Cloud storage provider Dropbox has said the password reset measures the company put in place has prevented any hacking of user data, following revelations made in stories which argued that millions of account details had been accessed.

Certain Dropbox users received an email from the cloud storage provider earlier this week advising that if their account password was the same as before mid-2012, they will be prompted to change it the next time they sign in.

A blog post at the time from Patrick...

By James Bourne, 31 August 2016, 0 comments. Categories: Data Management, Security, Software, Storage, Vulnerabilities.

The top 100 best practices in big data – revealed

(c)iStock.com/ismagilov

The Cloud Security Alliance (CSA) has today released a mammoth document detailing the 100 best practices in big data security – running the gamut from traditional cybersecurity measures to cutting edge cryptographic technologies.

The document discusses each tip at more of a cursory than comprehensive level, offering a few sentences on why and how organisations should implement them. The report goes through 10 areas with 10 tips for each, from real-time security and compliance...

By James Bourne, 26 August 2016, 1 comment. Categories: Big Data, Data & Analytics, Security, Vulnerabilities.

Encryption of cloud data is great – but it’s not a magic bullet

(c)iStock.com/BsWei

The headlong stampede of enterprise data into the cloud has passed by.

A few years ago I might have written it was ‘underway,’ but this would grossly understate the situation.  Data which was once stored on premise has left the building, the twinkling lights on the tin box in your racks are slowly blinking out. Data osmosis is taking place, draining life force from these antiquated shells into vast data-centres run by some of the largest companies on earth.   It...

By Ed Macnair, 23 August 2016, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Regulation, Security.

AWS and Azure get the highest federal security rating: What happens from here?

(c)iStock.com/Kevin Smart

Cloud services have been able to store customers’ data for many years now, but the number of prospective clients for several vendors has recently dramatically increased.

Back in late June, the announcement was made that three vendors had received special certifications from the federal government, allowing them to store sensitive data that the government had...

By Rick Delgado, 18 August 2016, 0 comments. Categories: Amazon, Government, Microsoft, PublicSector, Regulation, Security.

Why security and compliance are still the main blockers to cloud adoption

(c)iStock.com/LPETTET

According to the Cloud Industry Forum, 80% of UK companies are adopting cloud technology as a key part of their overall IT and business strategy. However, one of the perceived barriers to cloud adoption continues to be concerns around security and compliance, which was the key topic of discussion at a recent techUK panel in which iland took part. During this discussion, we talked about the fact that nine out of ten security professionals worry about cloud security.

One of the key aspects that...

By Monica Brink, 16 August 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Research suggests “tactical rather than strategic” cloud adoption in ASEAN

(c)iStock.com/NickILitov

Small to medium businesses in ASEAN (Association of South East Asian Nations) are certainly on the cloud bandwagon – but it’s a stretch to say they are confident about its capabilities.

That was the overall finding from research conducted by Data & Storage Asean and commissioned by Barracuda Networks. The survey, which polled 130 IT professionals from small businesses in Indonesia, Malaysia, the Philippines and Singapore, found 73% of respondents argued their data was...

By James Bourne, 15 August 2016, 0 comments. Categories: Adoption, Infrastructure, Research, Security.

Research argues greater confidence in public cloud security from IT pros

(c)iStock.com/scanrail

IT professionals are becoming more confident in the security of the public cloud compared to corporate data centres, according to the latest study from IT consulting firm SADA Systems.

The poll, which quizzed more than 200 IT managers around their use of public cloud services, found that 84% of respondents were using some form of public cloud infrastructure today.

49% of respondents said they used Google Cloud Platform, compared with 48% for Microsoft and 42% for AWS – although...

By James Bourne, 12 August 2016, 0 comments. Categories: Data Centres, Infrastructure, Research, Security.

Examining a new approach to data centre security

(c)iStock.com/4x-Image

Changing with the times is frequently overlooked when it comes to data security. Technology is becoming increasingly dynamic, but most data centres are still using archaic security measures to protect their network – which isn’t going to stand a chance against today’s sophisticated attacks.

Recent efforts to upgrade these massive security systems are still falling short. Data centres house a huge amount of data and there shouldn’t be any shortcuts when...

By Yoav Shay Daniely, 11 August 2016, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Infrastructure, Security.

Microsoft research aims to better utilise encrypted cloud data without privacy fears

(c)iStock.com/maxkabakov

In some instances, encryption is a double-edged sword: if data is encrypted in the cloud, it’s secure, but you can’t get access to it. Yet a new research paper presented by Microsoft may be the first step to changing it.

The paper examines the concept of secure data exchange (SDE), where the aim, as a blog post from Microsoft Research writer John Roach puts it, is to...

By James Bourne, 10 August 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Google launches customer-supplied encryption keys for greater cloud security

(c)iStock.com/serg3d

Google has launched customer-supplied encryption keys (CESK) for its Compute Engine infrastructure as a service (IaaS), which enables organisations to better protect their cloudy data.

The search giant automatically encrypts customer content stored at rest, including all Compute Engine disks, but in a blog post written by Maya Kaczorowski and Eric Bahna, product managers at Google Cloud Platform, the new release is aimed to be “secure, fast and easy” for users.

“With CESK, disks at...

By James Bourne, 05 August 2016, 0 comments. Categories: Data Management, IaaS, Infrastructure, Security.