Security

Extending the Edge: New Thinking on Data Security

Internet Cyber Security

Security, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own device) policies, network endpoints, it is a practice that, for most companies, evolved in a reactive fashion – new technology acquired… Read More

Google Cloud Customers Can Now Use their Own Encryption Keys

ThinkstockPhotos-511879348-e1460145085823

The Customer-Supplied Encryption Keys (CESK) option for Google’s Compute Engine has been released to general availability, the company announced Monday. Google will continue to encrypt customer content by default, but making CESK generally available allows customers to better control their data security. Google Cloud Platform (GCP) automatically uses one or more encryption… Read More

Clinton Campaign Says Hackers Accessed Data Program It Used

vote

by Chris Strohm and Margaret Talev (Bloomberg) – Hillary Clinton’s presidential campaign confirmed that one of its data programs was accessed by hackers, the latest development in what cybersecurity experts call a broad operation by Russian operatives to infiltrate U.S. political organizations. “An analytics data program maintained by the DNC,… Read More

Additional Security Articles