The Three Fundamental Security Benefits of Cloud-Based Commerce Solutions

Grazed from Business2Community.  Author: Lance Wright.

As cyber security becomes a larger focal point in the media and minds of online shoppers, consumers understandably have increasing concerns when it comes to what protections are offered by retailers. Across channels, only 55% of shoppers think retailers use security systems that adequately protect their data, and not surprisingly so.

In fact, Trustwave reports that data breaches increased by 53.6% from 2012 to 2013, with more than half of thosebreaches targeting ecommerce sites. Of special concern is highly sensitive data, including credit card numbers andpersonally identifiable information. But with customer expectations on the rise and IT budgets commonly on thefall, how can retailers meet the security needs of today’s digital environment? For many organizations, turning to cloud-based commerce solutions helps fill the gap...

Cloud Computing: Bring Your Own Encryption - balancing security with practicality

Grazed from UnionGazette.  Author: Editorial Staff.

Given that the start off of the 21st century, safety has emerged from scare-story status to grow to be one of IT users' largest difficulties &ndash as survey after survey confirms. Along the way a quantity of uncomfortable lessons have been learned, and are still getting discovered.

The initially lesson is that security technology should generally be deemed in a human context. No one particular nevertheless believes in a technological repair that will put an finish to all safety problems, since time and once again we hear of new kinds of cyber-attack that bypass sophisticated and safe technology by targeting human nature &ndash from alarming emails ostensibly from official sources, to friendly social invitations to share a funny download. Or indeed a harmless seeking USB stick 'accidentally' dropped by the office entrance, or a fake policeman demanding a couple of private specifics to confirm that you are not criminally liable...

DISA releases new security guide for cloud computing

Grazed from DefenseSystems. Author: Kevin McCaney.

The Defense Information Systems Agency has released its new security requirements guide for cloud computing, which is intended to make it easier—and quicker—for Defense Department agencies to procure commercial cloud services while still ensuring security. The new SRG puts out to pasture the Cloud Security Model, under which only a handful of vendors had received authorization, and more closely follows the Federal Risk and Authorization Management Program used by civilian federal agencies—although it does set additional requirements in areas where extra security is needed. In many cases, cloud providers will seek to comply with the SRG in coordination with their FedRAMP reauthorization.

"The SRG is designed to ensure that DOD can attain the full economic and technical advantages of using the commercial cloud without putting the department’s data and missions at risk," Mark Orndorff, DISA Risk Management Executive, said in a statement. The new guide sets the security requirements for information up to the Secret classification, sets standards for what systems or information can be handled in a virtual environment and what data should be physically separated, and tweaks the impact levels identified under the old Cloud Security Model...

Cloud Computing: What’s big in venture capital - Security, security, security

Grazed from GigaOM.  Author: Derrick Harris.

Steve Herrod has seen a lot in the enterprise IT space, having spent 12 years at VMware — the last several years as CTO and vice president of R&D — before leaving in 2013 to join venture capital firm General Catalyst Partners.

And right now, after seemingly dozens of high-profile cyberattacks in as many months, Herrod has security on his mind. He came on the Structure Show podcast this week to tell how he’s thinking about that space...

Cloud Computing: Securing The Modern Enterprise From The Ground Up

Grazed from Forbes. Author: Ping Li.

Big data, cloud services and mobile technology are having a revolutionary impact on business. Not only are these innovations fueling the modern enterprise, they are also sending security risks sky high. Traditional network perimeters are dissolving as businesses reshape their organizations around these burgeoning technologies.

I actually have a lot of empathy for CISOs. They have one of the hardest jobs in the world these days, especially as the traditional perimeter-based approach to network security rapidly loses its relevance. Enterprise security has changed because the enterprise has changed, drastically so...

Cloud Computing: DISA Aims for Next-Generation System to Secure Millions of Connected Devices

Grazed from NextGov. Author: Editorial Staff.

The Defense Information Systems Agency is turning to industry for “novel” approaches to secure the millions of devices plugged in -- and virtually connected -- to the Pentagon’s computer networks. A Jan. 5 request for information queries contractors on a “next-generation” endpoint security system that would allow the agency to better configure, secure and keep tabs on network endpoints all using a central management tool.

Put simply, endpoints are all those devices -- desktops, laptops, mobile devices, servers -- connected to DOD’s networks. All told, there are 4 million of them. Endpoint security, then, describes the process of safeguarding those devices -- usually through software, such as antivirus and firewall protections...

Cloud Computing: Security Industry Competitive Focus To Shift To Software And Solutions

Grazed from SourceSecurity.  Author: Tim Shen.

The global economy is in recovery, and China’s domestic market keeps its strong momentum. Politically, the terrorist attacks and uncertain factors still exist; and with years of market cultivation, people’s safety awareness continues to grow.

Important trends include the popularisation of HD, intelligence, integration and the increasing impact brought on by the Internet and Big Data. The connection between IoT (Internet of Things) and video surveillance continues to develop; applications in smart homes and intelligent traffic are very good examples...

Microsoft, rivals challenge U.S. government over cloud data privacy

Grazed from TechTarget. Author: Rob Wright.

Some of Microsoft's fiercest rivals, including Apple Inc. and Inc., have come to the defense of the software giant in a controversial cloud data privacy case that could have negative implications for cloud security. Microsoft Monday filed 10 amicus briefs, also known as friend of the court briefs, from a diverse group of technology firms, media companies, and trade associations that support Microsoft's opposition to a U.S. search warrant for customer emails stored in a data center in Ireland. Microsoft refused to comply with the warrant, which was part of a drug-related investigation, arguing that the data center is outside the jurisdiction of the U.S. Department of Justice.

But U.S. Magistrate Judge James Francis ruled against Microsoft in April, and later a federal court ordered Microsoft to hand over the emails to prosecutors. Microsoft recently filed an appeal of the decision and says it's committed to protecting customer's data in the cloud...

Cloud Computing: Most Violent Cyber Attack Noted To Date - 2008 Pipeline Explosion Caused By Remote Hacking

Grazed from CTOVision.  Author: Bob Gourley.

Reporting by Jordan Robertson and Michael Riley in Bloomberg is shedding new light on a destructive attack against an oil pipeline that caused a massive explosion in Refahiye Turkey in 2008. The event occurred six years ago, but information is just coming out indicating the cyber attack component of this event.

Robertson and Riley’s reports indicate that the pipeline was fitted with sensors and cameras to monitor all 1099 miles of the pipeline from the Caspian Sea to the Mediterranean, but the blast did not trigger a single distress signal. They also did not trigger the massive explosion and continuing combustion in eastern Turkey...

Cloud Computing: Where Tech Giants Protect Privacy

Grazed from NYTimes.  Author: Mark Scott.

FROM their glass-fronted office parks and start-up lofts in Silicon Valley, American tech companies oversee ever-expanding global empires.

Google has a bigger slice of the online search market in Europe than it does at home, where rivals like Microsoft still give it a run for its money. More than 80 percent of Facebook’s 1.3 billion users live outside the United States, with Brazil and India among the social network’s most important markets. And Apple, which generates roughly 60 percent of its revenue overseas, now sells more iPhones and iPads in Shanghai and St. Petersburg than it does in San Diego...