Cloud Security Alliance (CSA), a non-profit industry organization that promotes the protection techniques in the cloud, has recently updated its list of the top threats of cloud in the report entitled “The Notorious Nine Cloud Computing Top Threats in 2013”. CSA indicates that the report reflects the consensus of the experts on the most significant…

Traders and users who want to use cloud, smartphones and tablets as mobile payment devices card processing should be cautious and wait for the availability of greater protection techniques. It is a recommendation of the PCI Security Standards Council, which considers that, in its current stage, these systems introduce new security challenges. The PCI Security…

Most corporations subscribe and work through computer networks in order for their day-to-day operations to be accomplished. It is also a fact that the internet is widely patronized for research and even communications. However, the internet is not a secure environment and is always susceptible to viruses and hackers. While firewalls are an option for…

If you are using cloud computing technology in some form, the recent Payment Card Industry Data Security Standard guidelines released should be major news for you. While it is only targeted towards organizations who are already using the technology as a big part of their cardholder data environment (CDE), the guidelines have far reaching consequences…

A series of cyber-assaults have recently targeted various banks all over the United States. A type of malware dubbed ‘itsokaynoproblembro’ or Brobot has reportedly been in action for a number of years, operating under the radar of various anti-virus programs. However, it is only recently that the virus has directly affected the cloud platforms and…

The European Agency for Network and Information Security Information Security Agency (ENISA) published a report that argues excessive growth of cloud computing is a double-edged risk. But the agency also recognizes the advantages of using the cloud. Barely a week after the announcement by the European Commission of its plans for a new directive on…

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array…

Security and compliance concerns are still major stumbling blocks to cloud adoption. According to a study by security firm Lieberman Software, nearly 48% of members of teams in business fear of government and legal interference before putting sensitive data in the cloud. This is a survey to close more than 300 IT professionals who revealed…

Business leaders around the world are discovering that cloud computing is more expensive than imagined at the time they decided to adopt the technology, according to KPMG survey report. The KPMG survey, “The cloud takes shape”, polled more than 650 IT and business leaders across 16 major global markets and found that almost 33% of…

Around the world, Internet users are beginning to tire of giving their personal data on the Internet and the big data information collected and monetized is headed for a clash with privacy concerns. According to tech analyst firm Ovum, netizens around the world begin to realize the amount of personal data collected. The survey conducted…