Guest Blog Post
Why cloud security requires multiple layers
November 25, 2013
(Editor’s note: In this guest essay, Rajiv Gupta, founder and CEO of Skyhigh Networks, explains why layers of security are vital to protecting Internet cloud services.)
The digital universe containing our photos, videos, movies, banking data, health data, tax statements and more is doubling roughly every two years.
Securing this data is a concern. The proportion of sensitive data in the digital universe that requires protection is growing …More
Why the U.S. needs a cyber doctrine
November 22, 2013
(Editor’s note: In this guest essay, Timothy R. Sample, Vice President, Special Programs Organization, Battelle Memorial Institute, outlines why the U.S. needs to establish a clear policy on things cyber.)
How will the United States lead in this new era of cyber technologies?
U.S. foreign policy and national security must now take into account the cyber dimension. At the moment, there is a lack of clarity. We do not …More
How Facebook gets rich leveraging personas
November 14, 2013
On October 30th, Facebook held its third quarter earnings call. Lost inside the upbeat state of the union was a recurring theme that active and inactive Facebook users need to take note of: Facebook is knowingly placing your information at risk and needs …More
Hackers probe HTTPS weaknesses
November 12, 2013
(Editors note: In this guest essay, Rohit Sethi, Vice President of consultancy Security Compass, examines the implications of HTTPS, the protocol for secure network communications, coming under attack.)
HTTPS is vulnerable to attack, and we can expect the situation to worsen over time. In two to five years, serious compromises of the Web’s underlying security structure could take place more frequently at the criminal level.
This doesn’t mean that HTTPS is broken – it still provides strong protection against many online …More
How to keep the NSA out of your company’s data
November 11, 2013
(Editor’s note: In this guest post, Yorgen Edholm, CEO of file sharing company Accellion, discusses security exposures that come with use of the public cloud.)
Who’s in the driver’s seat on your cloud strategy? Bob from marketing? Lisa from sales? It sounds ludicrous, but it’s an unfortunate reality.
Today there are a lot of employees back-seat driving cloud corporate strategies by subscribing to public cloud solutions without IT’s knowledge.
This means that proprietary corporate documents – such as confidential design specs, sales …More
How Big Data can make the Internet safer
November 7, 2013
The growing sophistication of computer malware, especially its ability to morph and assume different forms, is making traditional approaches to security irrelevant. With massive amounts of data and traffic flowing in and out of enterprise networks it is no longer possible to prevent cyber attacks using signature-based security tools.
Current approaches to …More
Snowden disclosures fuel Europe’s privacy fears
October 31, 2013
(Editor’s note: In this guest essay, attorney Brian Henchey, from the Dallas law firm Baker Botts, outlines how the Edward Snowden affair is impacting Europe’s Safe Harbor data transfer rules.)
Although it has been six months since the first disclosure by Edward Snowden, the public revelations of the scope and scale of the capabilities of the National Security Agency do not appear to be slowing down.
Based on new leaked information, the NSA has recently been accused of eavesdropping on the …Morekeep looking »