Security online
4 views | +3 today
Follow
Security online
The hows and why's of making yourself safe in the Cloud
Curated by i-webdesigner
Your new post is loading...
Your new post is loading...
Scooped by i-webdesigner
Scoop.it!

Web Security Fundamentals - Free Video Course

Web Security Fundamentals - Free Video Course | Security online | Scoop.it
RT @varonis: Hate shots? Don't get SQL Injected. Vaccinate with Web Security Fundamentals course @troyhunt http://t.co/2cpb4RtfRH http://t.…
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

When Online Security Conflicts With Online Scrutiny, Is Security the Loser ... - Huffington Post UK

When Online Security Conflicts With Online Scrutiny, Is Security the Loser ... - Huffington Post UK | Security online | Scoop.it
Communications data includes data about who people communicate with, how and when they do so, how long conversations last.
i-webdesigner's insight:

Always likely to be a conflict - which side do you come down on?

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Securing the Internet of Things: This decade’s IT challenge

Securing the Internet of Things:  This decade’s IT challenge | Security online | Scoop.it
The promise of all those connected “things” is bright – if we can work together to address IoT security.
i-webdesigner's insight:

How many of us realise just how this will affect us in the future and how easily we are walking into it

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Trojan uses steganography to hide itself in image files

Trojan uses steganography to hide itself in image files #cloudsecurity #cybersecurity #computer_security http://t.co/GFkTThMHcn
i-webdesigner's insight:

his has been around a while and is really disconcerting when you find it happens

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Smaller companies seek cybersecurity - Business - NorthJersey.com

Smaller companies seek cybersecurity - Business - NorthJersey.com | Security online | Scoop.it
When hacking incidents and data breaches occur at small companies, they rarely become known to the public.
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

7 Security Cloud Infographics | Blog

7 Security Cloud Infographics | Blog | Security online | Scoop.it
Cloud security, however, is much more complex than just realizing is the cloud secure or not.
i-webdesigner's insight:

Allows you to compare and think through the issues 

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

The most sophisticated Android Trojan

The most sophisticated Android Trojan | Security online | Scoop.it
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.
more...
No comment yet.
Rescooped by i-webdesigner from Cyber Security and Defense
Scoop.it!

The 7 deadly sins of cloud computing - ComputerworldUK

The 7 deadly sins of cloud computing - ComputerworldUK | Security online | Scoop.it
The 7 deadly sins of cloud computing
ComputerworldUK
... to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

Via Fang Feng
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Businesses must radically rethink their approach to cloud security

Businesses must radically rethink their approach to cloud security | Security online | Scoop.it
Rather than try to keep up with increasingly sophisticated cybercriminals, organisations can use a 'secure breach' to kill the value of their data
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Is the Cloud Safe for Healthcare? - Healthcare Informatics - Healthcare Informatics

Is the Cloud Safe for Healthcare? - Healthcare Informatics - Healthcare Informatics | Security online | Scoop.it
In May, hackers broke into the networks of an Indiana-based medical software company.
i-webdesigner's insight:

Almost certainly not... as recent events have proved, anything is hackable. But the knowledge that accurate healthcare data can be available to anyone mean that this conflict will only grow

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

8 Ways to Prevent Your Website from Being Hacked [Website Security]

For More Information Please Visit http://www.etrafficwebmarketing.com.au/ or http://www.etrafficwebdesign.com.au/ Wordpress Web Design ...
i-webdesigner's insight:

Nice and short video

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Almost 50% of enterprise websites are open to attack

Almost 50% of enterprise websites are open to attack | Security online | Scoop.it
Cloud Computing Intelligence helping business to make the most from cloud technology
i-webdesigner's insight:

Only 50%....

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Identity Theft: Consumers Say They'd Rather Be Naked

Identity Theft: Consumers Say They'd Rather Be Naked | Security online | Scoop.it
More people say they would prefer to have naked photos of themselves posted online than to have their financial information stolen.
i-webdesigner's insight:

Or neither of these, surely

more...
No comment yet.
Rescooped by i-webdesigner from Chief Technologist Cloud Strategy
Scoop.it!

President Obama Launches Review of Big Data and Privacy | Multichannel.com

President Obama Launches Review of Big Data and Privacy | Multichannel.com | Security online | Scoop.it

President Barack Obama said Friday that he is charging adviser John Podesta with leading a "comprehensive review of big data and privacy," which will enlist Eric Schmidt executive chairman of Google and the other members of the President's Council of Advisors on Science and Technology
 
Obama said that group would "reach out to privacy experts, technologists and business leaders, and look at how the challenges inherent in big data are being confronted by both the public and private sectors; whether we can forge international norms on how to manage this data; and how we can continue to promote the free flow of information in ways that are consistent with both privacy and security."
 
That came in a speech at the Justice Department on a number of changes to government data information collection that he said would end the bulk data collection program as it is currently formulated, but not end it. Those changes include more Congressional oversight; collecting less information--two degrees rather than three removed from a terrorist, for example; and adding an independent advocate on the FISA (Foreign Intelligence Surveillance Act) court, which reviews government requests to collect data.
 
The President acknowledged that the speed of technological change raises issues about conflating the ability to do something with its advisability, a question increasingly raised by the speed and power of the Internet.
 
"The power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do," he said. "[T]he combination of increased digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats. But the government collection and storage of such bulk data also creates a potential for abuse."
 
The President said bulk data collection would continue, but that the government would not be the one holding it. It was unclear what entitiies would be doing that. He said that there were problems with putting the onus on telecom companies or a third party exclusively to be the repository, so the details had yet to be worked out.
 
The President's comparison of marketing data collection with government surveillance did not sit well with the Digital Marketing Association (DMA), which indicated it was not pleased that the President in the speech had "conflated" marketing data with government surveillance.

 

Click headline to read more--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc, Christian Verstraete
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Online Security for the Paranoid

Online Security for the Paranoid | Security online | Scoop.it
Online security for the paranoid. Some alternatives to the big companies for secure search, browsing, messaging and data storage
more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

How the “Internet of Things” Will Feed Cloud Computing's Next Evolution - Infosecurity Magazine (blog)

How the “Internet of Things” Will Feed Cloud Computing's Next Evolution - Infosecurity Magazine (blog) | Security online | Scoop.it
How the “Internet of Things” Will Feed Cloud Computing's Next Evolution Infosecurity Magazine (blog) The Cloud Security Alliance comprises many subject matter experts from a wide variety of disciplines, united in our objectives: to promote a common...
i-webdesigner's insight:

The internet of things...it's been a long time coming

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

How new technology is creating the perfect security storm

How new technology is creating the perfect security storm | Security online | Scoop.it
With BYOD (bring your own device) just one threat businesses face, policies that are open and transparent to staff are a must
i-webdesigner's insight:

The next area of concern for IT professionals

more...
No comment yet.
Scooped by i-webdesigner
Scoop.it!

Security Fears Give Way to Economics as Cloud Computing Grows

Security Fears Give Way to Economics as Cloud Computing Grows | Security online | Scoop.it
Stuart McClure has simple advice for companies that want to put their data in the cloud: Don't do it.
more...
No comment yet.