Cloud computing

  • DHS begins move to cloud

    Last week, federal officials announced that DHS had made its first move to begin consolidating and migrating many of its public websites to cloud servers to reduce costs

  • Hackers using cloud networks to launch powerful attacks

    In a disturbing new trend, hackers have begun harnessing the vast computing power of cloud based servers to carry out powerful cyber attacks; cloud computing services piece together large strings of online servers and storage systems to provide users with enormous processing power and terabytes of storage space; earlier this year, a German researcher, demonstrated that a cloud server could fire 400,000 passwords a second at a secured Wi-Fi network; in the recent attacks that shut down Sony’s online customer networks in April, hackers used cloud based attacks to disrupt service to roughly 100 million users worldwide

  • DARPA building stronger cloud cyber defenses

    Pentagon researchers are seeking to develop cloud-based computing networks that can remain operational even while under cyber attack; the Defense Advanced Research Projects Agency (DARPA), the Department of Defense’s advanced research department, is working on a project called Mission oriented Resilient Clouds (MRC) which aims to build resiliency into existing cloud networks to preserve “mission effectiveness” during a cyberattack; the project is still in its early phases of development

  • U.S. reducing number of data centers, moving to the cloud

    The U.S. government operates 2,100 data centers; these centers, together, occupy more than 350,000 square feet; to cut cost and increase security, the government plans to close 137 of the centers by the end of the year, part of a broader plan to close 800 data center within the next five years; in addition, 100 e-mail systems serving about one million government employees will be moved to the cloud

  • Ceelox unveils fingerprint authentication for cloud networks

    Ceelox, Inc. recently announced the release of Ceelox ID Online which is a biometric solution designed specifically for cloud computing applications; users can now use their fingerprints to securely authenticate their credentials, minimizing the threat of having their user name and password stolen or compromised; stolen passwords and online identity theft has risen dramatically in recent years; from mid-2005 to mid-2006 alone, roughly fifteen million Americans were the victims of fraud related to identity theft; with Ceelox ID, users also have the flexibility to use one password for all their accounts to increase flexibility and convenience, while maintaining security

  • Keeping digital data safe

    The recent Epsilon data leak incident was serious, as it exposed a large number of people to an attack called “spear phishing,” in which an attacker targets specific users or organizations with attempts to steal personal information; this incident could have been much worse: many third-party organizations have aggregated large amounts of our personal information in one place, making us increasingly vulnerable to the type of attack we saw with Epsilon — and attack in which a single breach can result in the compromise of a large amount of user data

  • ISC West panel to focus on cloud computing security threats

    As businesses increasingly turn to cloud computing solutions, security professionals have become concerned with the challenges of securing data that is stored off-site in light of growing numbers of cyber security attacks; while cloud networks offer smaller businesses low cost technology solutions and remote access to data anywhere, this also leaves data beyond a company’s span of control; To discuss securing data on cloud computing networks, a panel at the upcoming ISC West conference will focus on security solutions and risk management plans; the ISC West panel will be held on 6 April 2011

  • Brivo: using the Internet to control, secure devices

    Cloud computing offers efficiency and economy — but the Achilles Heel of the technology is security; Brivo uses software as a service (SaaS)-based physical access control systems (PACS) to leverage the power and versatility of the Internet to provide real-time device control for organizations that need to protect buildings and facilities

  • NEC releases software that configures access policy automatically

    NEC Corporation announced the development of technology that collectively distributes and configures access policy to a variety of computing resources in a cloud computing environment; the newly-developed technology helps to reduce operation costs and to improve security

  • Fujitsu develops inter-cloud data security technology

    With the advent of cloud computing, the boundary separating internal and external data has become increasingly blurred due to the utilization of external services; as a result, existing methods of preventing data leakage, such as only using a gateway to block the outflow of confidential data, have become insufficient, and there is increased demand for new security technology to allow the safe use of confidential data even in the cloud; Fujitsu offers a new data leakage prevention technology in cloud computing environments

  • Google Apps more secure with two-step verification

    More and more companies are migrating their e-mail and other cloud services over to Google Apps — but the doubts about whether making such a transition would put company security at risk linger; now the company is doing something about it: Google announced early Monday the availability of two-step verification, a more secure way for Google Apps users to sign into their accounts

  • Cloud computing addressing security issues

    With cloud improvements such as Google’s “sharding” — the dividing of an individual file among hundreds of systems to prevent someone from gaining a useful amount of information out of individual documents — being implemented and followed closely by competing providers, security and accessibility will become cloud facets continually improved upon

  • Algorithm could improve hospital records security

    An algorithm secures patients’ records by ensuring that access to information is available to those who need it, but only when necessary; for example, once a patient has been admitted to hospital, the admissions staff do not necessarily need access to the patient’s records anymore; in many hospitals, those staff members nonetheless continue to have access to every record on file; using the algorithm, those staffers would only be able to access the patient’s record during admission processing; after that, they would find your information unavailable

  • Security tensions at the core of the cloud concept hobble cloud growth

    The cloud model and the notion of data having a specific location are somewhat antithetical: some cloud-service providers attempt to maintain security and availability by locating the data in multiple servers or data centers, or by locating it in an undisclosed data center; cloud-service providers are thus in a tight situation with regard to secrecy about their data centers and security procedures: many of these providers believe that this information must remain secret, but many customers — including giant potential customers such as the U.S. federal government — want to be made aware of such information before signing on with a provider

  • A smarter, faster, more controllable cloud

    Different types of cloud applications have different needs; a highly interactive application such as a voice chat program probably needs a high-quality connection; a file-backup service that transfers data in bulk might benefit from the least expensive transit between machines; a proposed system would let cloud developers control the way their data travels across different machines