Cybersecurity

Cloud Computing: Top 3 CIO Challenges in 2015: Security, Downtime and Talent

Grazed from LogicWorks.  Author: Editorial Staff.

What are the top CIO challenges in 2015? According to a survey reported yesterday on CIO.com, security, downtime, and staffing top the list of workplace issues “keeping CIOs up at night.”

No surprises there. After a flurry of recent high-profile cyber-attacks and internal security breaches, the majority of CIO executives will ramp up the security and availability of their systems in 2015, according to the report. Unfortunately, this often means that teams are scrambling to finish a checklist of CIO security concerns to patch up the most immediate vulnerabilities, rather than taking a longer view and building rigorous and monitored security practices into all layers of their IT deployments...

Security Vendors Say New Technologies Needed to to Bolster Cloud Defenses

Grazed from eWeek.  Author: David Needle.

Much work remains to be done if security breaches such as those at Sony Pictures Entertainment and health insurer Anthem are to become a rare event. That was the consensus of security vendors speaking at the OnCloud 2015 conference here this week. While malicious hackers will continue working to crack the latest security schemes, Barmak Meftah, CEO of AlienVault said security could be greatly enhanced by enterprises sharing more information.

“Imagine if we had a way to share threat data around the world,” he said. “For once we could be more proactive rather than reactive.” Only recently have companies become more forthcoming about data breaches, thanks largely to legislation and social media giving consumers an outlet to quickly spread the news that their personal accounts have been hacked and private information exposed...

See more at: http://www.eweek.com/cloud/security-vendors-say-new-technologies-needed-to-to-bolster-cloud-defenses.html#sthash.yxzdpxqR.dpuf

Cloud Computing: What Google knows about data security that you should know too

Grazed from CBC. Author: Jeff Green.

A new report on cloud storage prepared for Google by a Hamilton-based risk advisor shows that businesses need to take a truly global look to completely secure data. And in an interview with the CBC, James Arlen, director of risk and advisory services for Leviathan Security Group, says the same principles of data security companies such as Google need, apply to your personal data, too.

Arlen said the average person treats their personal memories like a digital shoe box, adding it just takes one "flood" for a catastrophic loss to occur. "The person who kept all the photos of the first four years of their child's life on their computer and now their hard drive crashed," Arlen said. "Now your child's photographic life begins at four."...

Cloud Computing: Cyber Security Web Site Dedicated to C-Suite and Business Personnel Launches

Grazed from PR.Com.  Author: PR Announcement.

The proliferation of cloud computing, big data, BYOD, mobile and inter-connected networks have become opportunistic breeding grounds for cyber criminals to disrupt business operations and cause financial loss as well as to gain access to corporate and personal data. Such losses were estimated last year in excess of $500 billion effecting companies of all sizes.

The impact of a corporate security exposure or breach is staggering and prior implications have proven to result in a loss of revenue, customer confidence and litigation...

Cloud Computing: Expert Advice - How to Up Your Cyber Security

Grazed from Entrepreneur. Author: Ann C. Logue.

The average cost to a U.S. business of a lost or stolen record containing customer information is $201, according to the 2014 Cost of Data Breach Study conducted by the Ponemon Institute for IBM. The most expensive incidents are due to malicious attacks, not to human error or process failure. That’s a problem for your business.

Mega-retailer Target may have had to pay cash to counter its late-2013 data hack, which reportedly affected up to 110 million customers, but it was lucky. Similar breaches have resulted in the destruction of companies. “If you get it wrong, your business can be erased,” says Ken Ammon, chief strategy officer at Xceedium Inc. in Herndon, Va. Xceedium sells platforms used by government and major corporate customers to manage access privileges on information systems...

New Cloud Computing Security Requirements Guide - Part II

Grazed from CCSKGuide. Author: Editorial Staff.

The DoD’s new Cloud Computing Security Requirements Guide (SRG), released by the Defense Information Systems Agency (DISA), replaces their previous Cloud Security Model. The guide outlines an overall “security posture” that directs cloud service providers (CSPs) seeking to work with the DoD. This article is a continuation of a previous one, which introduced the four new information impact levels. Here, we will examine the DoD process of risk assessment of cloud service offerings, as defined by the SRG.

Risk Assessment Process

Shifting to cloud computing means that risk management processes must change as well. The goal is to address requirements and controls, relative to the criticality of DoD information in the external cloud, in a cost effective way. At the same time, it is also to assure the security of DoD core missions and networks in accordance with the DoD RMF...

Cloud Computing: Fortscale and the Enemy Inside

Grazed from VirtualizationReview. Author: Dan Kusnetzky.

Fortscale's Idan Tendler, CEO and co-founder, came by to discuss what his company has been doing since our last conversation at the Splunk user group conference roughly a year ago. Each time I have the opportunity to speak with him, I learn something more about how analysis of the organization's operational and machine logs can help.

This time Tendler pointed out that many of today's security breaches or thefts of customer data can be attributed either to malicious staff behavior, or staff not following the enterprise's data governance or security policies. Staffers are typically given access to many of the organization's data assets...

3 Cloud Computing Security Holes to Watch Out For

Grazed from SmartDataCollective. Author: Natalie Leher.

When your data and files are going to be ‘up there somewhere’, it’s only normal that you’ll want to think security in the cloud. You could of course adopt the strategy of never betting more (data) than you can afford to lose. However, the cost reductions available and the massive move of your competitors to the cloud may force you to use rather more of it than you anticipated. Gotta keep up with the neighbors, right? Well, it turns out that the applications you live next to in cloud computing can also be a source of security risk for you…

1. Not So Nice Neighbors Depending on what kind of cloud computing you want to do, other customers may affect you in a couple of ways. For example, if a multitenant cloud database is not properly designed, a flaw in somebody else’s application may open the door for a hacker to everybody’s data in that database...

Cloud Computing: Israel's Team8 attracts investment for cyber security firms

Grazed from Reuters. Author: Steven Scheer.

Team8, an Israeli venture capital fund focused on the cyber-security industry, said on Tuesday it had raised $18 million in its first round of funding, including investment from Alcatel-Lucent and Cisco . Also participating in the round were Bessemer Venture Partners, Marker LLC and Innovation Endeavors, which was founded by Google executive chairman Eric Schmidt.

Led by veterans of the Israeli army's 8200 intelligence and electronic espionage unit, Team8 aims to develop cyber-security companies that offer more in-depth protection than the usual defence against hacking attempts by generic malware. Bessemer partner David Cowan said that could set them apart from the legions of security start-ups in Silicon Valley...

The Top Two Cloud Computing Security Concerns of 2015

Grazed from CloudWedge.  Author: Sean Shado.

The most cited barrier to entry for cloud into the enterprise continues to be the security concerns involved with an infrastructure overhaul. Many IT decision makers are hesitating on making the switch to cloud as far as mission critical apps are concerned because of the unknown variables posed by cloud security risks. A KPMG report mentions that cloud security is still a top concern as IT executives look for ways to reduce costs.

The report mentions that 45% of respondents said data loss and data privacy were their top hesitations in regards to cloud implementations. What exactly are the biggest cloud computing security risks that will emerge in 2015?...