Category Archives: Cloud Computing Security

Will 2015 Data Security Be Different Than 2014?

Depositphotos_46324909_s

The year 2014 will be remembered for sensitive security breaches with hacks against Sony Pictures and leaked photos of high-profile entertainers from Apple’s iCloud. These data breaches have caused many people to question online security and if it can be

Don’t Give Up on the Cloud Just Yet: How to Secure Your Digital Information

shutterstock_216094468

With the recent hacking of iCloud and the release of nude photos of celebrities, everyone is more concerned than ever about cloud security. A lot of people started asking, if this can happen to famous people with enough money to

Don’t Let Usability Issues Compromise Security

Anyone who has worked in an office environment as probably received an email or alert notifying staff that it’s time to change their login passwords (again) — and that those passwords have to meet an ever growing list of criteria:

Google Chrome OS: Too secure to need security?

A leading security researcher has warned that Google risks repeating Apple’s mistakes on security with its new Chrome OS. Google Chrome OS is a Linux-based operating system designed to work exclusively with web applications. Chrome netbooks running the new OS

GFI MAX MailArchive Flexible Secure Solution

GFI Software has released GFI MAX MailArchive, an external service that allows business to archive email messages in a geographically distributed data centers for the possibility to follow prepare and search content. Platform-service can be used either independently or as

Tarantino-style Secure Cloud Computing

Chemtrails, Vegas, Roulette and the IRS By Rick Lawhorn CISSP, CISA, CHP, CHSS No matter if you believe in conspiratorial chemtrails or scientifically sound contrails, the ability to see where you have been and guess which direction you are potentially

Quick Tips on Secure Shell

SSH is a perfect security alternative to Telnet and has been used by system administrators and IT managers to configure and implement servers and network devices, here I wanted to list manual on Secure Shell usage. First let’s start by