Tag Archives: Cloud security

Interview about Cloud Computing on Express FM DATA

This week I have been honored to be a guest on one of the popular Tech program in Tunisia. The program covers all new technologies exist in the country and one of the hottest topic at the moment is Cloud

Will 2015 Data Security Be Different Than 2014?

Depositphotos_46324909_s

The year 2014 will be remembered for sensitive security breaches with hacks against Sony Pictures and leaked photos of high-profile entertainers from Apple’s iCloud. These data breaches have caused many people to question online security and if it can be

Don’t Give Up on the Cloud Just Yet: How to Secure Your Digital Information

shutterstock_216094468

With the recent hacking of iCloud and the release of nude photos of celebrities, everyone is more concerned than ever about cloud security. A lot of people started asking, if this can happen to famous people with enough money to

Apple Confirms iMessage Security

imessage_hero_4x3

Apple released a new paper describe the security of iMessage application that is widely used to connect with other apple devices. The document includes the security used to protect user’s data and files encryption. iMessage is very convenient for user

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO

Google Chrome OS: Too secure to need security?

A leading security researcher has warned that Google risks repeating Apple’s mistakes on security with its new Chrome OS. Google Chrome OS is a Linux-based operating system designed to work exclusively with web applications. Chrome netbooks running the new OS

Quick Tips on Secure Shell

SSH is a perfect security alternative to Telnet and has been used by system administrators and IT managers to configure and implement servers and network devices, here I wanted to list manual on Secure Shell usage. First let’s start by