The future of cyber protests takes out RIAA MPAA and AiPlex
Image credit: Gawker If you have not followed the events this weekend where a group of users from 4Chan decided that it was appropriate to take out the MPAA, RIAA and AiPlex using a simple DDoS tool...
View ArticleCloud Vendors Push US Congress For More Data Protection
One of the biggest concerns regarding Cloud Computing is about the privacy of data on third party servers. Along with data thefts that could happen due to bad security policies of the vendors, there is...
View ArticleEnterprise Cloud Computing And Wikileaks Saga
In my previous post, I argued about how public clouds will eventually dominate the enterprise IT scene though better economics. I also pointed out that it is not going to happen anytime sooner because...
View ArticleFoxmarks, Xmarks, LastPass, Xpass, LastX, X%^&% Quick Rant
Warning: I think I’m becoming a curmudgeon – except that title has until now been reserved for somebody else . But I still have doubts about the recent transaction: LastPass acquired Xmarks. I really...
View ArticleYour Twitter security is an egg, not an onion
Hard to come up with a more fuzzy title really. Let me cut through the usual Twitter conversation show and pick only one: .@CoCreatr @VenessaMiemis @dsearls Twitter DMs can be seen by 3rd parties...
View ArticleFirehost Gives Customers A Peep Into Their Security
Firehost (see previous CloudAve coverage), the managed hosting provider with strong focus on security, today announced a new feature called “Security View”, available through the customer portal, which...
View ArticleThoughts on Mobile Security and Applications
I had an interesting discussion about mobile systems security and banking over the weekend with some friends from the University of Washington. Here are my thoughts on what is going to be some of the...
View ArticleNew Gmail Scam making the rounds
Again with the warnings: do not click on that link or reply to that email a new Gmail scam is making the rounds today. Don’t give out your e-mail information, including user name and password. The...
View ArticleThe LastNews (!) You Want to Hear is LastPass Hacked. Now What?
Password management service LastPass notified users their servers may have been hacked. I take a minute break, let it sink in. Yes, this is the one (Last) uber-super secure system you trust with ALL...
View ArticleOne Firewall for a United Europe
Does Europe need a firewall much like the famous Great Firewall of China? As we continue to struggle with the ideas of the internet, censorship, and illegal activity, Torrent Freak is reporting about a...
View ArticleVMware Horizon App Manager – A Quick Analysis
Whether you want to call it consumerization of enterprises or democratization of IT, we know that it is happening already and no FUD can stop them anymore. Instead of fighting this process, today’s...
View ArticleApigee Asks: Is Your API PCI Compliant?
Apigee (previous CloudAve coverage), the API management company formerly known as Sonoa Systems, yesterday launched PCI-Compliant API management solution in the cloud. As we move into an increasingly...
View ArticleWhat is Really Holding the Cloud Back?
As I was listening to speakers at Structure Conference this year, something caught my attention and changed my thinking on cloud priorities. When IT decision makers are asked to rate the top challenges...
View ArticleVerizon Acquires CloudSwitch To Beef Up Terremark Enterprise Cloud
Image via Wikipedia Verizon (previous CloudAve coverage) yesterday announced that they are acquiring CloudSwitch (previous CloudAve coverage), the Burlington based company founded in 2008 to make life...
View ArticleVideo: Cloud In The Eyes Of VCs
From time to time, we post videos from different vendors on their take about cloud marketplace. Below is a video of Okta CEO, Todd McKinnon, talking to two of their VCs Ben Horowitz (from Andreessen...
View ArticleAppSense Trying To Make Personal Clouds Enterprise Worthy
AppSense, the NewYork based company focussed on Virtualization solutions, today announced their research wing, AppSense Labs, focussed on bridging the gap between personal services and enterprise. They...
View ArticlePresentation: Cloud Security Management – Overview and Challenges
What’s your first priority cloud security concern ? From an attacker’s perspective, cloud providers aggregate access to many victims’ data into a single point of entry. As the cloud environments become...
View ArticleUnderstanding Shodan HQ for hacking and cyber warfare
Understanding Shodan HQ for hacking and cyber warfare Shodan HQ is probably one of the more interesting web sites that few people know about. Shodan scans the internet looking for devices that people...
View ArticleKim Dot Com’s new Mega site has XSS Security Holes
Any new site, not just Mega is going to have security holes, and reports have surfaced in Twitter, Reddit, and over on ZDNet that Mega has a couple of persistent XSS security holes that are going to...
View ArticleExecutive Order: Improving Critical Infrastructure Cybersecurity
Heck, we wouldn’t be bloggers, and we wouldn’t care about our industry, cloud or information security if we didn’t spend time reading this executive order and seeing what hidden neat treats there are...
View Article
More Pages to Explore .....