encryption
Google Android apps send private info of users to Facebook
In a surprising finding, Android apps are reported to be sending private information of users to Facebook servers- even if the user doesn’t have an official Facebook account. The apps which are indulging in such activities include Yelp, Indeed, Spotify, Duolingo, Skyscanner, Kayak and 23 other popular applications which have humongous amounts of downloads of […]
Google offers Adiantum Mobile Security to entry-level Android smartphones
Google LLC has made it official that it is going to offer Adiantum mobile security to entry-level Android smartphones developed to encrypt data on devices that do not operate on the latest ARMv8 Processors. The objective of the latest offering is to secure devices that are unable to support Advanced Encryption Standard (AES) that are […]
Tech companies against ‘Coalition Bill’ which expose customers to Government Spies
A private body named ‘The Digital Industry Group’ representing tech companies Facebook, Google, Amazon, and Twitter has expressed its concern over a ‘Coalition bill’ which forces the companies to assist law enforcement agencies like ASIO(Australian Security Intelligence Organization) in decrypting private communications. In simple terms, the tech companies are against a government-drafted bill brought into […]
US CLOUD Act Drives Adoption of Cloud Encryption
This post was originally published here by Rich Campagna. The US Clarifying Lawful Overseas Use of Data (CLOUD) Act was quietly enacted into law on March 23, 2018. I say quietly due to the controversial nature of how it was passed – snuck into the back of a 2,300 page Federal spending bill on the eve of […]
Twitter to announce “Secret Conversation” by this year-end
Twitter, one of the worlds renowned social networking platform is all set to announce a tool called “Secret Conversation” by this year-end. The company is reported to have started the testing of its application package on some of its trusted users and is all set to announce it on an official note by the next […]
How to protect your enterprise from Computer Viruses, Hackers, Spyware, and Ransomware
In the digital world, an SMB can simply be financially ruined with the help viruses, spyware, and ransomware spread by hackers. So, for such businesses, computer protection plays an equally important role on par with accounting and marketing. For this reason, Cybersecurity Insiders is offering some simple tips to help businesses protect themselves from ever-evolving […]
Amazon Web Services offers new Cloud Security feature to vulnerable S3 customers
From early this year, they have been multiple high profile incidents which said that AWS customers have inadvertently left data unprotected on S3 servers making it easy to access for hackers. For instance, a well known hacking group was found accessing unprotected data of Accenture and Dow Jones from Amazon’s Simple Storage Service. Obviously, such […]
Consider these Cloud Security Tips while moving data or workloads to Cloud
As long as the data or workloads remain in your corporate territory, you are the only boss who could access and manage it. But when you plan to move your workloads to external data centers, then technically the usual parameters related to network perimeter security doesn’t apply. Therefore, before making a Service Level Agreement (SLA) […]
what’s so special about a CASB: part three
In Part 1 of this series, we explored how cloud security has evolved to encompass cloud apps and unmanaged device access. In Part 2, we learned how Bitglass is the only Cloud Access Security Broker that can provide total data protection in-line and in real-time end-to-end (from the cloud application to any device). So what features does Bitglass provide? How do we […]
Where does Salesforce platform encryption fall short?
Mike Schuricht wrote an interesting post about Where does Salesforce platform encryption fall short? that I would like to share. “Salesforce Shield (Salesforce’s platform encryption product) has now been on the market for about a year and a half. The goal is to encrypt data at rest in Salesforce with a bring your own key (BYOK) approach […]