The security concerns about cloud infrastructure that shadowed the technology from its nascent stages have largely dissipated as cloud adoption has spread and security has improved. While even public cloud infrastructure is now far more secure, data in the cloud is unfortunately still vulnerable due to a different challenge – misconfiguration.
A Yahoo News investigative report concludes that Russia’s SVR foreign intelligence service developed the disinformation that US Democratic National Committee data director Seth Rich was murdered to cover up corruption by then-Presidential candidate Hillary Clinton.
While there is much discussion about the data security and privacy risks created by third parties, another source of risk can be significant but overlooked: that from fourth parties – those vendors that your vendors use – who may be integral players in your mission fulfillment but who are beyond your direct contractual oversight.
Does an increase in spending lead to an overall reduction in risk? Not necessarily. An organization may spend millions on network security controls but still get breached through an application code vulnerability. New attack methods and new technologies to deal with them show up all the time. So, to maximize efforts at assessing security risk, resources must be allocated such that the most effective tools and strategies are used to protect the most important information assets.
The common belief that encryption enables bad behavior primarily used by thieves, international terrorists, and other villainous characters is simply not true. Here’s why. Encryption engenders passionate opinions and reactions from a variety of government regulators, technologists, and privacy and security advocates. It’s become the de facto standard of online commerce and communication, embraced by technocrats and security pros everywhere.
Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready. Misplacing or having your devices stolen can put a damper on any vacation, says Kelvin Coleman, executive director of the National Cyber Security Alliance (NCSA). To prepare for your trip, set up the “find my phone” feature on your device.