Cloud Computing

This category contains 27 posts

More Cyber Security Lessons From “The Martian”

In last week’s post, I covered the methodologies Mark Watney used to stay alive on the surface of Mars and how those lessons can be adapted for better cyber security back on Earth. As usual, this post will contain spoilers for The Martian, so close it now if you haven’t yet read the book or … Continue reading

The Numbers Behind Cloud User Error

In the not-too-distant past, service providers had a tough time convincing enterprise IT departments that cloud platforms were secure enough for corporate data. Fortunately perspectives on cloud have matured, and more and more organizations are migrating their sanctioned file sharing applications to the cloud. Fast forward to 2020, when Gartner predicts 95% of cloud security failures will … Continue reading

Enterprise Data Breaches on the Rise Despite Infosec Policies

The results of the 2014 Protiviti IT Security and Privacy Survey reports that: •  77% of organizations have a password policy or standard. •  67% of organizations have a data production and privacy policy. •  67% of organizations have an information security policy. •  59% of organizations have a workstation/laptop security policy. •  59% of … Continue reading

Keep your Data and Applications Safe from CSA Top Threats

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ownership of sensitive data as they move from the physical environment to a … Continue reading

CSA Guidance V.4: Domain 1 now available for review and comments

The Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it’s last revision in 2011, the cloud landscape, tools and technologies have … Continue reading

Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report

Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the Cloud By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterprise-ready services procured by the IT department such as Office 365 to far lesser … Continue reading

Five Tips for Not Becoming an Insider Threat

Most employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers to steal data, and it can cost their employer (and customers) millions. Unintentional insider threats can cost a U.S. company … Continue reading

Consumer IoT Security Impacts

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. News of exploits against consumer IoT devices is common, and … Continue reading

The Definition of Cloud Computing

What is the cloud and why should I go there? The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based solutions. Migrating to the cloud can be a scary prospect for many organizations. In fact, the question is often asked: What actually … Continue reading

Three Ways to Improve Your Personal Cyber Safety

For National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well documented. One of the biggest cyber security problems impacting users today is the reuse of easy to guess passwords across … Continue reading

Web Stats

  • 132,525 hits


@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 17 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,799 other followers

Twitter Updates


April 2018
« Mar