User Blogs

User Blogs

Discussions and Blogs
Tags >> Cloud Security
Sep 20
2012

New ISACA Guide Facilitates Secure Migration to the Cloud

Posted by Cinthia Pilar in Cloud Security , Cloud

Cinthia Pilar

Cloud computing continues to have a significant impact on the way enterprises operate, and companies are increasingly migrating to the cloud as a result of its value. But security and data privacy concerns are critical issues to consider before adopting cloud-computing services. Security Considerations for Cloud Computing, a new book from global nonprofit IT association ISACA, presents practical guidance for IT and business professionals to help them securely move to the cloud. 

Nov 06
2011

Should You Store Passwords In The Cloud?

Posted by Robert Siciliano in Cloud Security , Cloud

Robert Siciliano

It seems that almost every site on the web requires a password. At least twice a week, I get an email from someone who wants me to join yet another network, which requires yet another username and password. You can cop out and use the same username and password combination, but that’s just asking for trouble.

Nov 04
2011

Top Six Free Cloud Storage Centers

Posted by Robert Siciliano in Data Storage , Cloud Security

Robert Siciliano

“Free” is one of my favorite words  so when I have the option to get something for free, I will allocate a reasonable amount of time figuring out how I can apply that to my life before I determine if I should adopt it, or if it’s worth the extra few bucks for the paid version, or if it isn’t worth my time at all.

Oct 25
2011

Cloud Home Security is Here

Posted by Robert Siciliano in Cloud Security

Robert Siciliano

A burglary occurs every 15 seconds. The chance of your home being broken into is higher than you’d think. The good news is that today’s alarm systems are “not your father’s alarm.” Twenty years ago, a contractor had to spend a week tearing up your walls, ceilings, and windows to retrofit a messy, hardwired security system. These alarms were so expensive that they were mainly used by businesses, rather than in private homes.

Oct 20
2011

Cloud-Based ATMs Coming Your Way

Posted by Robert Siciliano in PCI , Cloud Security , Cloud

Robert Siciliano

Criminals often target cash machines, as well as various other automated kiosks that dispense DVDs, tickets, or other merchandise. They have discovered numerous techniques for compromising these devices. According to the ATM Industry Association (ATMIA), ATM fraud alone results in over a billion dollars in losses each year.

Sep 07
2011

What to Look for In Cloud Security

Posted by Robert Siciliano in Cloud Security

Robert Siciliano

Is your data in the cloud? Right now as we speak billions are being invested my major corporations to store and back up data in the cloud. It’s cheaper and it’s safer.

Apr 05
2011

Cloud Security: Private vs. Public

Posted by Brent Huston in Cloud Security , Cloud

Brent Huston

Recently, the issue of cloud security came up in one of our meetings. I said, "USB's are going to be a thing of the past."  At first we had the hype. Now we have the reality. More and more data is being stored in the cloud.


Subscribe via Email

 Your Email:
Banner

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit authentication Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches Browser Security BS 25999 burglar burglary Business Continuity BYOD card fraud change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer Fraud Consumer IT Tips consumer privacy consumer scams contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud criminal Criminal Identity Theft Cross-Device Security cyber crime cyber fraud Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data privacy data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport email and web security EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook Facebook privacy facebook safety tips facebook scam FCC FCPA FDIC Federal Government FFIEC Financial Crisis financial fraud firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs hacked Hackers hacking Hackproof Hacktivism holidays home invasion home security Hotspot HotSpot Shield VPN HP IAM iCloud id ID Theft identity fraud identity proofing identity protection Identity theft identity theft prevention identity theft protection Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety internet tracking iOS app iovation IP address iphone iphone apps iPhone security IRS IRS Scams ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger kids privacy kids safety laptop security license linkedin scam Litigation lottery scam Malware malware phishing marathon master password mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile phone security mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog netgear Network Security New Years NFC NFC app Online Backup Online Banking online dating online fraud online gaming online identity online privacy online safety online scams Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport password password manager password security passwords PCI Performance Management personal data personal device Personal Security pheasting phishing phishing scams Policy predator Privacy privacy and security privacy policy Prize Draw protecting kids online public WIFI QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management router RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping Shoulder Surfers shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social media scams social network Social Security SOX spam spammers spokesman Spyware SSDs ssn Standards strangers Strategy tablets tax fraud tax return scams tax scam tax scams Tech tech support technology Threat Management Tokenization TQM trojan Twitter typosquatting Virus viruses VPN wallet web Webcast Q&A Wi-Fi WIFI wifi hacking WiFi password Wifi security wireless Worms
Banner