Why it’s time to fight back against cyber risk to cloud computing and virtual machines

Cloud computing is now a primary driver of the world’s digital economy. Governments, large corporations and small businesses are increasingly implementing cloud-based infrastructures and solutions to store their sensitive data and manage their operations.

While the cloud offers lower costs, scalability and flexibility, it also expands a company’s risk profile exponentially. In fact, attackers are continually refining their techniques to take advantage of the millions of identical binary templates...

By Simon Hartley, 31 October 2018, 0 comments. Categories: Hacking, Security.

Why the cloud is key to mitigating the menace of phishing

After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back onto the IT security manager’s radar.

According to our latest survey on IT security in the UK and Ireland, phishing is now the second most pressing cyber security issue after data breaches. The survey of 104 IT and security managers found that the majority of...

By Lior Samuelson, 26 July 2018, 0 comments. Categories: Best Practice, Data & Analytics, Hacking, Security.

Mining Bitcoins in the cloud catches on

Josh Garza, the CEO of GAW Miners, first made a name for himself by building one of the top online retail stores for cryptocurrency mining equipment. Garza has pivoted that operation into the cloud by launching what he has dubbed hashlets. These hashlets are designed to create Bitcoins using a combination of ASIC (Application Specific Integrated Circuits) and cloud data center technology.

CloudWedge first reported on organizations wanting to use cloud to mint...

By CloudWedge, 10 September 2014, 1 comment. Categories: Hacking.

CSA warns PRISM is very bad news for US cloud providers

The after-effects of PRISM means that companies are much less likely to use US-based cloud service providers (CSPs), according to a survey from the Cloud Security Alliance.

56% were less likely to use US-based providers, with one in 10 going as far to say that they’d cancelled a project which used US CSPs as a result. Only 3%, interestingly, said their confidence in US vendors had increased.

It’s noticeable that, from the vendors’ perspective, their confidence had not been diminished. 64%...

By James Bourne, 25 July 2013, 2 comments. Categories: Government, Hacking, Regulation, Research, Security.

Should your private cloud use a single or a dual firewall?

Should Your Private Cloud Use a Single or a Dual Firewall?

– Brought to you by 2X Cloud Computing guest blogger Brien M. Posey –

Many private clouds are constructed in a way that allows clients to connect either locally or from the Internet. In the case of Internet connectivity, the Web Portal and Secure Client Gateway components that are used to facilitate the connection are almost always located behind a perimeter firewall. While the need for an Internet...

By 2X Software, 12 July 2013, 0 comments. Categories: Hacking, Private, Security.

Proactive security is required in highly regulated industries

Andrew Kellett, Principal Analyst, Infrastructure and SecurityMaintaining security that meets the risk and compliance requirements of the enterprise is a constant challenge. Systems and networks are becoming more open and accessible, but at the same time, threats have become more advanced, persistent, and complex. This is a particularly important issue in highly regulated markets such as financial services, where failure to protect sensitive information will have a negative effect on the business and how it is...

By Ovum StraightTalk, 22 April 2013, 0 comments. Categories: Architecture, Data & Analytics, Enterprise, Hacking, Infrastructure, Security.

Cloud security: From hacking the mainframe to protecting identity

By Andi Mann, Vice President, Strategic Solutions at CA

Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.

To understand how recent trends are shifting security, let’s revisit the golden age of

By GreenPages Technology Solutions, 12 April 2013, 0 comments. Categories: Hacking, Security.

Fears of cloud insecurity “should not drive infrastructure decisions”

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

By James Bourne, 27 March 2013, 0 comments. Categories: Hacking, Infrastructure, Research, Security.

Writer’s iCloud hacked as Wozniak calls cloud “horrendous”

Apple co-founder Steve Wozniak is hardly sitting on the fence with his opinions on the cloud

Speaking after a performance of Mike Daisey’s monologue “The Agony and the Ecstasy of Steve Jobs”, Steve Wozniak was in uncompromising mood concerning his thoughts on cloud computing.

Wozniak reportedly told the packed theatre audience: “I think [cloud’s] going to be horrendous. I think there are going to be a lot of horrible problems in the next five years”.

Five years is a long time. According...

By James Bourne, 06 August 2012, 2 comments. Categories: Hacking, Security.

Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

Hackers and Do-Gooders

What do hackers and do-gooders have in common? Well the other day when I was looking for detail on some hacking incidents, I ran across this little tidbit – Join me in Hacking Autism. I was intrigued and went to the site Hacking Autism.

What an excellent idea. Instead of hacking for fun (white-hats) or profit (black-hats) here’s developers putting their talent into helping others. Hackers as...

By Arthur Hicken, 06 September 2011, 0 comments. Categories: Hacking, Industry.

Is Encryption the Solution to Cloud Security and Privacy?

By Guest Blogger Erik Heels, Partner at Clock Tower Law Group, experts in patent law

Wikipedia defines "cloud computing" as "the logical computational resources (data, software) accessible via a computer network (through WAN or Internet etc.), rather than from a local computer.  Managing local computers is hard: there are security issues, computer lifecycle issues, accessibility issues.  Cloud computing, ideally, is easy: set it and forget it,...

By CloudSwitch, 06 September 2011, 0 comments. Categories: Big Data, Compliance, Consumer, Hacking, SaaS , Security, Storage.

SQL Injection – When Will We Learn?

Once again a major web site has been hacked using good old-fashioned SQL injection. Over the weekend Nokia’s developer forum was hacked, resulting in a Homer Simpson face being put up on their web (funny) and the loss of names, email, and other personal for many developers (not funny). This is but the latest in a now very long string of SQL injection attacks, and personally I don’t see much excuse on the part of those attacked.

It might have been possible...

By Arthur Hicken, 31 August 2011, 0 comments. Categories: Big Data, Compliance, Economy, Enterprise, Hacking, Industry, Infrastructure, Private, Security.