Security

Extending the Edge: New Thinking on Data Security

Internet Cyber Security

Security, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own device) policies, network endpoints, it is a practice that, for most companies, evolved in a reactive fashion – new technology acquired… Read More

Google Cloud Customers Can Now Use their Own Encryption Keys

ThinkstockPhotos-511879348-e1460145085823

The Customer-Supplied Encryption Keys (CESK) option for Google’s Compute Engine has been released to general availability, the company announced Monday. Google will continue to encrypt customer content by default, but making CESK generally available allows customers to better control their data security. Google Cloud Platform (GCP) automatically uses one or more encryption… Read More

Clinton Campaign Says Hackers Accessed Data Program It Used

vote

by Chris Strohm and Margaret Talev (Bloomberg) – Hillary Clinton’s presidential campaign confirmed that one of its data programs was accessed by hackers, the latest development in what cybersecurity experts call a broad operation by Russian operatives to infiltrate U.S. political organizations. “An analytics data program maintained by the DNC,… Read More

ZENEDGE Launches Single IP Protection at HostingCon

DDoS

ZENEDGE launched Single IP Protection to general availability on Tuesday at HostingCon to provide enterprise-class network DDoS mitigation to organizations with smaller networks. Network DDoS mitigation traditionally requires Border Gateway Protocol for routing decisions, which means they only work on networks with a minimum class C subnet including 254 usable… Read More

Nearly Half of All Corporate Data is Out of IT Department’s Control

ThinkstockPhotos-527045920-e1468867041928

Many organizations are not responding to the continuing spread of “Shadow IT” and cloud use with appropriate governance and security measures, and more than half do not have a proactive approach, according to research released Tuesday. The 2016 Global Cloud Data Security Study, compiled by the Ponemon Institute on behalf… Read More

Additional Security Articles