Google Apps Customers: Are 100,000 3rd Party Apps Collecting Too Much Data...
Bloomberg recently posted an article entitled “100,000 Android Apps Collect Too Much Data Security Firm Find” raising concerns over 3rd party apps installed on mobile devices including: The type of...
View ArticleConventional Wisdom and Cloud Security: No Convention, Questionable Wisdom
“It will be convenient to have a name for the ideas which are esteemed at any time for their acceptability, and it should be a term that emphasizes this predictability. I shall refer to these ideas...
View ArticleWhich 3rd Party Apps Are Taking Your Personal Details?
Last week, Lewis Smith published an article on the UK Mail Online cited a Carnegie Mellon University study that highlighted the 10 worst apps for taking personal details without letting you know. The...
View ArticleKeeping the House Clean – The Inevitable Proliferation of Google Docs (Drive)
As more organizations adopt Google Apps (Drive/Docs and Sites) and people realize that sharing files is a whole new way of working more easily and efficiently, it will inevitably turn viral (in a good...
View ArticleWhere Apps Meet Work, Adding Limitations Causes Chaos
Quentin Hardy of the New York Times had an excellent article yesterday entitled “Where Apps Meet Work, Secret Data Is at Risk.” The article gave great, real world examples of companies facing the same...
View ArticleThe Cloud Allows CIOs and CISOs to Invest the Right Amount for Information...
Introduction As Admiral Grace Hopper wrote: Some day, on the corporate balance sheet, there will be an entry which reads Information; for in most cases, the information is more valuable than the...
View ArticleData in the Clear and Mobile Application Risk
In a recent entry in the Android bug tracking forums, a developer reported that the Android backup services (via the BackupManager apps) are transmitting critical user information — including...
View ArticleFrom Arthur’s Desk: A Data Breach Prevented in Time
This is the first installment of the From Arthur’s Desk series discussing such topics as compliance and governance, discovery and metrics and more. What do most data breaches have in common?...
View ArticlePCI Data Theft from Target Stores
Early this morning, Target Corp. announced that PCI data for more than 40 million customers had been stolen from their retail network: Target & Secret Service Investigating Credit/Debit Card...
View ArticleCloudLock Introduces First Fully Cloud-Based Selective Encryption Solution
CloudLock Selective Encryption™ Leverages Content-Aware Capabilities to Intelligently and Non-Disruptively Protect Data Stored in the Public Cloud WALTHAM, MA–(Marketwired – Feb 20, 2014) – RSA...
View Article