• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / data security

data security

Thwarting the Mobile Data Security Threat

Thwarting the Mobile Data Security Threat

By Gilad Parann-Nissany on February 7, 2014

Mobile usage is up in the work force – and it is not about to go down. Check out these statistics: Mobile broadband subscribers are forecasted to grow dramatically from 1 billion in 2011 to over 5 billion globally in 2016. By 2015, more Americans will have mobile access to the internet than desktop PCs. […]

Posted in Security, Your POV | Tagged cloud encryption, cloud security, data security | 2 Responses

Hacking Into The Indian Education System Reveals Score Tampering

Hacking Into The Indian Education System Reveals Score Tampering

By Chirag Mehta on June 13, 2013

Debarghya Das has a fascinating story on how he managed to bypass a silly web security layer to get access to the results of 150,000 ISCE (10th grade) and 65,000 ISC (12th grade) students in India. While lack of security and total ignorance to safeguard sensitive information is an interesting topic what is more fascinating […]

Posted in Security | Tagged big data, data science, data security, education, github, India, mapreduce, voting machine

Presentation: Cloud Security Management - Overview and Challenges

Presentation: Cloud Security Management – Overview and Challenges

By Ofir Nachmani on August 26, 2012

What’s your first priority cloud security concern ? From an attacker’s perspective, cloud providers aggregate access to many victims’ data into a single point of entry. As the cloud environments become more and more popular, they will increasingly become the focus of attacks. Some organizations think that liability can be outsourced, but no, it cannot! […]

Posted in Infrastructure, Security | Tagged Amazon Machine Image, Amazon Web Services, aws, cloud computing, data security, IT risk, Newvem, Security, Vulnerability (computing)

Dropbox Shows Why We Can't Have The Cloud The Way We Imagined

Dropbox Shows Why We Can’t Have The Cloud The Way We Imagined

By Krishnan Subramanian on April 21, 2011

For the past few weeks, Tech Media is buzzing with discussions on Dropbox (see previous CloudAve coverage) security. Dropbox from their modest beginnings have grown big with 25 Million users. Recently, a security engineer Derek Newton exposed a serious security issue with them where they store the machine hash in an unencrypted form in any machine […]

Posted in Featured Posts, Infrastructure | Tagged data privacy, data security, dropbox, federated clouds, government subpoena, governments, insights | 2 Responses

Now You Can Get Your Google Apps Data Backed Up for Free.  Startup Econ 101: When Giving it Away is a Good Deal.

Now You Can Get Your Google Apps Data Backed Up for Free. Startup Econ 101: When Giving it Away is a Good Deal.

By Zoli Erdos on March 15, 2011

Ouch that’s a longish title. OK, I admit, I am tired, could not decide between two messages and ended up combining them.  Well, let’s see the messages. The Art of Pricing The other day I got into a tweet convo with a Startup Entrepreneur whose product I found interesting, at least at first glance.  But […]

Posted in Application Software, Entrepreneurship, Featured Posts | Tagged backup, crowdsourced marketing, data security, freemium, google apps, google calendar, google docs, Spanning Backup, Spanning Sync, startup econ, startup pricing | 1 Response

Cloud Security Needs A Rethink But The Evolution Will Be Slow

Cloud Security Needs A Rethink But The Evolution Will Be Slow

By Krishnan Subramanian on September 17, 2009

Image via Wikipedia Recently, Andreas M. Antonopoulos wrote an informative piece on Computer World about Cloud Security. In his post, he clearly outlines the mental shift needed on Cloud Security so that auditors and regulators are convinced about the issues of security and compliance. The crucial takeaway from his post is the following we are rapidly moving […]

Posted in Security | Tagged cloud computing, data security, Enterprise, location security, private clouds, public clouds, Security | 4 Responses

Do You Want to Pay Ransom for Your Data?

Do You Want to Pay Ransom for Your Data?

By Zoli Erdos on July 29, 2009

 I saw this ad on Craigslist: Stolen White MacBook – $1000 (berkeley) Date: 2009-07-29, 1:57AM PDT Reply to: sale-wuutq-1294683068@craigslist.org White MacBook stolen by two African American men near North Berkeley BART at 11:30 PM July 28, 2009. Willing to pay $1000 for the stolen laptop no questions asked as long as information is provided letting […]

Posted in Security | Tagged Craigslist, data security, data theft, laptop theft, laptops, notebooks, ransom | 2 Responses

SaaS and Religion: the Tenancy Debates. Do Customers Care?

SaaS and Religion: the Tenancy Debates. Do Customers Care?

By Zoli Erdos on June 30, 2009

(Warning: this is a long post. Only read it when sitting in a comfortable chair.  Or a pool lounge, holding your CrunchPad.) Two recent posts by Enterprise Social Software  vendors Jive and Atlassian set up a huge debate amongst my fellow Enterprise Irregulars.  Here’s the money-quote from Jive: It’s not so long ago that it […]

Posted in Analysis, Enterprise | Tagged atlassian, cloud computing, data security, enterprise software, infrastructure, jive, multi-tenant, on-demand, on-premise, private cloud, ReadWriteWeb, saas, salesforce.com, sharepoint, single-tenant, Software Architecture, software as a service, tenancy, zoho | 3 Responses

Rudder’s Financial Data Breach is NOT a SaaS Failure

Rudder’s Financial Data Breach is NOT a SaaS Failure

By Zoli Erdos on May 19, 2009

Wow, what a day.  I was halfway through writing a post inspired by Mint’s intent to sell aggregate, anonymized customer data – and it was meant to be a positive post, pointing out the business model potential in SaaS.  But somehow this message doesn’t feel right on the day people are up in arms finding […]

Posted in Analysis, Security | Tagged credit monitoring, data security, financial services, IBM, identity theft, mint, pr failure, privacy breach, rudder, saas, security breach | 1 Response

Questions To Ask Before Trusting a Cloud Vendor

Questions To Ask Before Trusting a Cloud Vendor

By Krishnan Subramanian on September 22, 2008

Many consumers and businesses are flocking to cloud computing as they see an opportunity to compete on equal footing with well established firms with big IT infrastructure. Even though there are apprehensions in the minds of clould computing customers, partly due to the myths promoted by some pundits and vendors whose core business is threatened […]

Posted in Infrastructure | Tagged CloudComputing, data security, privacy, trust, vendors | 11 Responses

feed mail facebook twitter linkedin

Popular Posts

  • Home
  • The Five-Step Maturity Model for Building a Collaborative Organization
  • Looking Back 2010: Key Cloud Acquisitions
  • Uncover latent needs with a simple question
  • From 24SevenOffice to 24SevenTravel and On to ...
  • User Interface and Cloud Computing - Part 1
  • The Discriminatory Dark Side Of Big Data
  • Driving SaaS Growth Through The Customer Lifecycle

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: