Guest Blog Post
Why, and how, encryption can make the cloud safer
March 5, 2014
(Editor’s note: In this guest Last Watchdog essay, Jieming Zhu, CEO of AlephCloud, outlines the promise – and pitfalls – a encrypting data to make things safer. AlephCloud supplies cloud-based security and privacy services.)
As commerce, communities, and collaboration move to public clouds, sensitive and private documents should be encrypted.
On the flip side, encryption can introduce new threats to privacy and security from diverse sources.
It may be necessary for a consultant, for example, to have access to company data since they are providing some useful function for the business. Or a government entity may have sovereign or law enforcement authority to access data, with an obligation to uphold the law and preserve national security.
The debate rages since Edward Snowden absconded with confidential NSA data. …More
News Sports Life Money Tech Travel Opinion 44°Weather Subscribe Media User Search 19 42 Why it’s time to recalibrate privacy
January 30, 2014
We are undergoing the “Uberfication” of our personal privacy. We freely exchange personal information for convenience.
We tell Uber where we are, our credit card information and some personal information, all for a much better experience …More
How our culture of surveillance dictates our lives
January 24, 2014
(Editor’s note, in this guest essay, William G. Staples, outlines how pervasive surveillance profoundly influences our daily lives, a topic examined in his new book: Everyday Surveillance: Vigilance and Visibility in Postmodern Life, outlines how we live in a culture of surveillance.)
We live in a culture of surveillance, one few of us can escape.
Our predicament is one of our own making.
Long before the National Security Agency took center stage, we were deploying ever more sophisticated ways of keeping a …More
Why you must control your own data
January 22, 2014
(Editor’s note: In this guest post, Brian Taptich, CEO of cloud storage company Bitcasa, lays out the case for minding your digital belongings.)
Your digital belongings are yours. Who do you want to be in control of them?
It’s hard to trust that the companies promising to store our digital assets won’t access them and use them for their own benefit. After all, Facebook has grown to a net worth of $100 billion, and Google, $300 billion, from manipulating their product—customers’ …More
‘Checkbox compliance’ won’t stop Target-like breaches
January 20, 2014
Most organizations that have gone through a successful compliance audit are still susceptible to a security breach.
Management typically spends the bare minimum to get a passing grade from the auditor yet the expense drains real dollars out of drastically needed IT budgets and doesn’t add to the …More
How biometrics can revive privacy
January 15, 2014
Privacy has never been such a public issue.
Social medial tools and channels now dominate our communication habits, and new technologies emerge seemingly every day.
Each carries with it the potential for more compromises and less privacy—from cookies to space satellites, we know our daily activities are being tracked and analyzed—yet we …More
How to cope with the Internet of Things’ dark side
January 14, 2014
The Internet of Things (IoT) promises to usher in exciting new ways of enhancing our lives, doing our jobs, conducting business, and more – simply by connecting everyday objects to the Internet.
But the intersection of our physical world with the ubiquitous always-on Internet opens a Pandora’s Box of security and …Morekeep looking »