Posts Tagged ‘Cloud Computing’

h1

Google Drive Wants a Piece of the File Sharing and Storage Pie – But It Might Not Taste So Sweet for Businesses

May 1, 2012

This week Google announced its newest offering, Google Drive. The launch of Google Drive, a cloud-based file storage and synchronization tool, places Google’s hat in the ring with other file sharing services. In response, Vice President of Sales and Client Services at FilesAnywhere, Shayne Mehringer, gave this statement:

“Google is king when it comes to Internet searching, and websites around the world count on them for outstanding targeted advertising abilities. However, this doesn’t necessarily make them right for the business and consumer file storage market. Oversaturation in the online storage and collaboration market is actually a good thing for us. Smart, professional consumers and corporations will now be forced to do their homework. Source 

Advertisements
h1

Apple holds the master decryption key when it comes to iCloud security, privacy

April 5, 2012

Apple can potentially decrypt and access all data stored on iCloud servers. This includes contacts, notes, unencrypted e-mails, application preferences, Safari bookmarks, calendars, and reminders.

This was recently confirmed by a source speaking to Ars, and security researcher and forensic data analysis expert Jonathan Zdziarski agreed. “I can tell you that the iCloud terms and conditions are pretty telling about what the capabilities are at Apple with respect to iCloud, and suggests they can view any and all content,” Zdziarski told Ars.

In particular, Zdziarski cited particular clauses of iCloud Terms and Conditions that state that Apple can “pre-screen, move, refuse, modify and/or remove Content at any time” if the content is deemed “objectionable” or otherwise in violation of the terms of service. Furthermore, Apple can “access, use, preserve and/or disclose your Account information and Content to law enforcement authorities” whenever required or permitted by law. Apple further says that it will review content reportedly in violation of copyright under DMCA statutes.

“If iCloud data was fully encrypted, they wouldn’t be able to review content, provide content to law enforcement, or attempt to identify DMCA violations,” Zdziarski told Ars.

Source

h1

New EU Data Laws: Cloud Brings Increased Risk Of Massive Fines

April 4, 2012

That was the warning delivered by Vinod Bange, a top London-based IT lawyer, as the EU proposes new laws to penalise data breaches.

Bange said: “Regulatory sanctions have gone way off the scale in terms of what we are used to right now. The sting in the tail, which did not exist before, is that there is a provision to calculate a fine that is based on a percentage of annual global turnover. That’s big news and a big change.

“Organisations have moved on so much since the original legislation in 1995. In this globalised, outsourced, social media, cloud driven environment, you could end up with a third tier fine.”

The EU is proposing three tiers of fines, the first of which runs up to £209,000 or 0.5 per cent of turnover, the second up to £418,000 or 1 per cent of turnover. The top tier allows for a fine of up to £837,000 or 2 per cent of turnover.

The latter could be a potentially massive fine to the tune of hundreds of millions, with tier three penalties relating to international data transfers. Businesses using the cloud, and data centres across the globe, could be more vulnerable to this massive whack of a fine.

Currently, the ICO’s maximum imposition for those who aren’t careful with their data is a £500,000 penalty.

Source: Computerworld

Read more: http://www.itproportal.com/2012/04/02/new-eu-data-laws-cloud-brings-increased-risk-of-massive-fines/#ixzz1r2Ox2ptx

h1

Free cloud services compared

March 13, 2012

Not all cloud services are built alike. We take a look at some of the most popular options — what they’re for, how you can use them and, most importantly, what you get.

h1

Researchers: How ‘leaky’ smart phones give up their crypto keys

March 4, 2012

Smart phones being used for sensitive transactions leak data that can be used to recover the cryptographic keys securing connections, researchers say. CPUs from as far away as 30 feet, said Benjamin Jun, vice president of technology at Cryptography Research Inc.

The data can be analyzed to reveal the cryptographic keys being generated and used. “That distance was a surprise to me,” said Jun, who is presenting results of the research at this week’s RSA Conference.“What we’re trying to do here is not show the limits of what can be done,” but to determine the amount of data leakage and demonstrate the dangers it poses, Jun said. By analyzing power consumption in the CPU during cryptographic processes, data — including crypto keys — could be extracted.

h1

RSA Unveils Industry-Leading Capabilities For Threat Information Sharing

February 28, 2012

“A shortage of specialized security expertise is a serious challenge for most organizations dealing with advanced threats,” says Bret Hartman, RSA’s chief technology officer. “Collaboration with outside partners is often the most efficient and convenient way to scale advanced threat capabilities and talent. Technology solutions such as RSA’s experimental collaboration platform will help companies with limited experience in advanced threats augment their capabilities, and will enable broader sharing of threat intelligence across the industry. We’d like others in the global security community to join us in exploring new methods, such as this type of framework, to share threat information on a much larger scale.”

h1

Cloud Computing – Business Transformation in the Cloud

February 3, 2012