//
archives

Cloud Computing

This category contains 27 posts

More Cyber Security Lessons From “The Martian”


In last week’s post, I covered the methodologies Mark Watney used to stay alive on the surface of Mars and how those lessons can be adapted for better cyber security back on Earth. As usual, this post will contain spoilers for The Martian, so close it now if you haven’t yet read the book or … Continue reading

The Numbers Behind Cloud User Error


In the not-too-distant past, service providers had a tough time convincing enterprise IT departments that cloud platforms were secure enough for corporate data. Fortunately perspectives on cloud have matured, and more and more organizations are migrating their sanctioned file sharing applications to the cloud. Fast forward to 2020, when Gartner predicts 95% of cloud security failures will … Continue reading

Enterprise Data Breaches on the Rise Despite Infosec Policies


The results of the 2014 Protiviti IT Security and Privacy Survey reports that: •  77% of organizations have a password policy or standard. •  67% of organizations have a data production and privacy policy. •  67% of organizations have an information security policy. •  59% of organizations have a workstation/laptop security policy. •  59% of … Continue reading

Keep your Data and Applications Safe from CSA Top Threats


The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ownership of sensitive data as they move from the physical environment to a … Continue reading

CSA Guidance V.4: Domain 1 now available for review and comments


The Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it’s last revision in 2011, the cloud landscape, tools and technologies have … Continue reading

Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report


Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the Cloud By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterprise-ready services procured by the IT department such as Office 365 to far lesser … Continue reading

Five Tips for Not Becoming an Insider Threat


Most employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers to steal data, and it can cost their employer (and customers) millions. Unintentional insider threats can cost a U.S. company … Continue reading

Consumer IoT Security Impacts


Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. News of exploits against consumer IoT devices is common, and … Continue reading

The Definition of Cloud Computing


What is the cloud and why should I go there? The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based solutions. Migrating to the cloud can be a scary prospect for many organizations. In fact, the question is often asked: What actually … Continue reading

Three Ways to Improve Your Personal Cyber Safety


For National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well documented. One of the biggest cyber security problems impacting users today is the reuse of easy to guess passwords across … Continue reading

Web Stats

  • 108,367 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, SACS, CISM, CCSP, CCSK, GICSP, CASP, CIW-WSP, PCNSE7, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,709 other followers

Twitter Updates

Archives

April 2017
M T W T F S S
« Mar    
 12
3456789
10111213141516
17181920212223
24252627282930