Google and Samsung KNOX: Less than meets the eye http://t.co/Jn0allCBXG




from Twitter http://ift.tt/1p6zYWJ



July 01, 2014 at 01:59AM

via IFTTT

Emojli is a chat app that only lets you send emoji http://t.co/dak2q8SdYB




from Twitter http://ift.tt/1p6zYWJ



July 01, 2014 at 12:16AM

via IFTTT

FBI, CIA Join NSA In "Backdoor" Searches On Americans http://t.co/1MaJoyl8ID




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 11:44PM

via IFTTT

Twenty-year-old vulnerability in LZO finally patched | CSO Online http://t.co/eQrP49PGxf




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 09:57PM

via IFTTT

Airport breach a sign for IT industry to think security, not money | CSO Online http://t.co/x6wVu1WW3Q




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 08:52PM

via IFTTT

New N.S.A. Chief Calls Damage From Snowden Leaks Manageable http://t.co/fwwECmDTrK




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 06:29PM

via IFTTT

Google’s new message to developers: don’t screw up Android http://t.co/j9XzS5dCj6




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 06:28PM

via IFTTT

HackingTeam mobile, PC spyware for governments spans many countries | CSO Online http://t.co/89hiXBYShr #APT




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 05:35PM

via IFTTT

The Inside Story Of Yo: There Isn't Actually $1 Million In The Bank - Business Insider http://t.co/1TO2zRbrZr




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 04:39PM

via IFTTT

Irish Pub Only Accepts Job Applications Through Snapchat http://t.co/JZfyUxoBJy




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 04:26PM

via IFTTT

The IPO is dying. Marc Andreessen explains why. - Vox http://t.co/PvUtc6lV5L




from Twitter http://ift.tt/1p6zYWJ



June 30, 2014 at 03:52PM

via IFTTT

Even With Twice As Many Users, Google Still Lags Apple In App Revenue http://t.co/g4UjW3lpGR




from Twitter http://ift.tt/1p6zYWJ



June 28, 2014 at 09:57PM

via IFTTT

Are we in a tech bubble? VCs say yes and no http://t.co/O7VglX4VsL




from Twitter http://ift.tt/1p6zYWJ



June 28, 2014 at 08:52PM

via IFTTT

Andreessen Horowitz Pumps $90 Million into IT Startup Tanium as Sinofsky Joins Board http://t.co/hmUsQseHI3




from Twitter http://ift.tt/1p6zYWJ



June 28, 2014 at 05:35PM

via IFTTT

I only wish to do business with those I trust. - dean. "Security Companies all sell the same thing: trust" Toby Weir-Jones.




from Twitter http://ift.tt/1p6zYWJ



June 27, 2014 at 10:05AM

via IFTTT

"HIPAA compliance can be particularly problematic" http://t.co/kS4pZEDLVT




from Twitter http://ift.tt/1p6zYWJ



June 27, 2014 at 06:00AM

via IFTTT

Researchers expect large wave of rootkits targeting 64-bit systems | Network World http://t.co/1CT56VWcSF




from Twitter http://ift.tt/1p6zYWJ



June 27, 2014 at 01:59AM

via IFTTT

Orange H.S. Student Accused Of Hacking Into Computer, Changing Grades « CBS New York http://t.co/aJh30WpKM9




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 09:57PM

via IFTTT

#scotus protects cellphones from illegal search. http://t.co/sGuyWc4yX0




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 08:52PM

via IFTTT

RT @johnbattelle: Germany cancels Verizon contract over security concerns http://t.co/F5UtBXAxYy




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 07:53PM

via IFTTT

Spotify’s Design Lead on Why Your Side Projects Should Be Silly: http://t.co/hzJ77JY5pW http://t.co/gHpmJBt3Wj




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 05:35PM

via IFTTT

The 3-Minute Technique for Brainstorming Your Product's Roadmap: http://t.co/D2bcgjjAyg http://t.co/1dFwmL4ZYU




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 03:52PM

via IFTTT

The World Needs “Invisible” People: The Power of Anonymous Work: http://t.co/dkw2j8IRDv




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 12:50PM

via IFTTT

How Yelp Brought A Sprawling Campus Feel To Downtown SF http://t.co/Cx33Owjd5W




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 12:05PM

via IFTTT

#scotus shoots down #aereo http://t.co/gvBdWDsj9M




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 12:03PM

via IFTTT

How to Name Your Startup: http://t.co/BSpyZgvjUi




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 12:03PM

via IFTTT

Virtual world Second Life to be reincarnated, with Oculus Rift | Technology http://t.co/Op3ACx9cf5 #VR #SecondLife




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 12:02PM

via IFTTT

A Google Analytics Resource Guide of Epic Proportion: http://t.co/OCvwqLeKWi




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 10:05AM

via IFTTT

Avoiding Stupidity is Easier than Seeking Brilliance http://t.co/Z69GAyeZA6 http://t.co/CIiWmVf6ue




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 06:00AM

via IFTTT

Google Cardboard VR #io #google http://t.co/BCpBVsDy9J




from Twitter http://ift.tt/1p6zYWJ



June 26, 2014 at 01:59AM

via IFTTT

"good cyber security is not just about a really strong wall on the outside, but some kind of an immune system within" Sir Jonathan Evans




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 05:35PM

via IFTTT

"We used to have the most generous research and development tax credit in the world 25 years ago, now we’re 27th" http://t.co/PJsNqRwjHe




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 03:52PM

via IFTTT

“Innovation Economics: The Race for Global Advantage” | Intellectual Property Watch http://t.co/ukzFMZG9FE




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 12:50PM

via IFTTT

NCC Group's new '.trust' domain promises Internet security overhaul | CSO Online http://t.co/8sUFvTZPgr #Security #.trust




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 12:09PM

via IFTTT

Encrypted Web traffic can reveal highly sensitive information | CSO Online http://t.co/bEQ6R3M8Pm #HIPPA #Security




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 10:05AM

via IFTTT

Hackers Access Metropolitan Companies Employee Information http://t.co/zRKaiDqpIQ




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 06:00AM

via IFTTT

Infosecurity - Online Daters Targeted by Massive Phishing Campaign http://t.co/5kG5G9sLpt




from Twitter http://ift.tt/1p6zYWJ



June 25, 2014 at 01:59AM

via IFTTT

2012 RCE bug is still highly exploited in targeted attacks, Trend Micro finds - SC Magazine http://t.co/GjxsJExPTN




from Twitter http://ift.tt/1p6zYWJ



June 24, 2014 at 09:57PM

via IFTTT

Ad network compromise led to rogue page redirects on Reuters site | Network World http://t.co/JCCuas2TEm




from Twitter http://ift.tt/1p6zYWJ



June 24, 2014 at 08:52PM

via IFTTT

188 Websites Shut Down for Selling Counterfeit Products http://t.co/CH3u5fq1t7




from Twitter http://ift.tt/1p6zYWJ



June 24, 2014 at 05:35PM

via IFTTT

Critical flaw exposes admin passwords of nearly 32,000 servers http://t.co/8qDUoimtnT




from Twitter http://ift.tt/1p6zYWJ



June 24, 2014 at 03:52PM

via IFTTT

FCC issues largest fine in history to company selling signal jammers | The Verge http://t.co/fjoI6aLngi




from Twitter http://ift.tt/1p6zYWJ



June 24, 2014 at 12:50PM

via IFTTT

Nathan Fillion to make cameo in 'Guardians of the Galaxy' | The Verge http://t.co/NpI0XrDWcN




from Twitter http://ift.tt/1p6zYWJ



June 22, 2014 at 08:52PM

via IFTTT

The Runner-Up Religions Of America : The Protojournalist : NPR http://t.co/asNYytNCne




from Twitter http://ift.tt/1p6zYWJ



June 22, 2014 at 05:35PM

via IFTTT

SaaS. #SaaS http://t.co/JaBvAyzzkA




from Twitter http://ift.tt/1p6zYWJ



June 22, 2014 at 01:59AM

via IFTTT

We could travel to new worlds in NASA's starship Enterprise http://t.co/3FiLuoys4v




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 03:52PM

via IFTTT

Can You Spot The 13 Security Flaws In This Photo? - http://t.co/wphNE64Ewd




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 12:50PM

via IFTTT

Scan of Google Play apps reveals thousands of secret keys - http://t.co/Y2PN4WRnZj #AndroidApps #MobileSecurity #Security




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 12:05PM

via IFTTT

Patient Data Breach - http://t.co/rrsfoikpAk #HIPPA #Security




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 10:05AM

via IFTTT

FBI arrests hacker - http://t.co/quSldFPAxF #FBI #Security #Hacker




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 06:00AM

via IFTTT

Android Rooting Software Vulnerable - http://t.co/sxa9VOIwbi #AndroidSecurity




from Twitter http://ift.tt/1p6zYWJ



June 21, 2014 at 01:59AM

via IFTTT

Technology sites riskier than illegal sites - http://t.co/WfGWCcJ0mM




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 09:57PM

via IFTTT

IE Script Engine Vulnerability - http://t.co/vKMXVBMSW5 #IEVulnerability




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 08:52PM

via IFTTT

How to Stop Facebook From Sharing Your Web Browsing History - http://t.co/DwjKrHIhbN #Privacy




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 06:55PM

via IFTTT

Evernote's Forum Server Has Been Hacked - http://t.co/EHxkMDcwFx #Evernote




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 05:35PM

via IFTTT

Each data breach is $3.5 million average. http://t.co/oUpAUCt9uF




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 04:12PM

via IFTTT

Open-Source Tool Aimed At Propelling Honeypots Into the Mainstream http://t.co/NXxvvvC7z5




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 03:52PM

via IFTTT

Information security is even more vital for the internet of things era http://t.co/ppCOPcK42x




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 12:50PM

via IFTTT

Protect Your Data in the Cloud http://t.co/rtm4FxSVSQ




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 12:05PM

via IFTTT

Beijing Implicated As Hong Kong Vote Sites Crash Under Massive DDoS http://t.co/6ZDyKNTrz6




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 10:05AM

via IFTTT

Google’s New Web Starter Kit Is A Boilerplate For Multi-Screen Web Development http://t.co/VNSXnx5aaD




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 06:00AM

via IFTTT

Apple just obsoleted the Mac and nobody noticed http://t.co/DwFHh50NcG




from Twitter http://ift.tt/1p6zYWJ



June 20, 2014 at 01:59AM

via IFTTT

Symantec MAM and MDM Solutions. http://t.co/rGfPaH8gHL




from Twitter http://ift.tt/1p6zYWJ



June 18, 2014 at 08:52PM

via IFTTT

NAS Boxes vulnerable. #Security http://t.co/RHMEfN1TtE




from Twitter http://ift.tt/1p6zYWJ



June 18, 2014 at 10:05AM

via IFTTT

Chinese Smuggling. http://t.co/zHlDWGwmin




from Twitter http://ift.tt/1p6zYWJ



June 18, 2014 at 06:00AM

via IFTTT

#DNS #Security Patch for DoS #Vulnerability in #BIND. http://t.co/6RjInRFqTN




from Twitter http://ift.tt/1p6zYWJ



June 18, 2014 at 01:59AM

via IFTTT

Chase ATM Skimming in #Chicago. http://t.co/AdLHK7cY6F #Chase #ATM #Security




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 09:57PM

via IFTTT

PF Chang confirms credit card breach. http://t.co/4ulsegcWxO #PFCHANG #Security




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 08:52PM

via IFTTT

Targeting Cloud based PoS System - http://t.co/T3vqIDAyaa #Security




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 05:35PM

via IFTTT

Hacker claims PayPal loophole generates FREE MONEY • The Register http://t.co/dhZggiiVk1 #PayPal #Security




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 03:52PM

via IFTTT

Google Mocks the NSA in Code of New Encryption Tool http://t.co/DhXuUgRNEN




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 12:50PM

via IFTTT

A Wearable SIM Could Let You Use One Number With Any Device http://t.co/U9RZ1h7VVx #Mobile #WearableSIM




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 12:05PM

via IFTTT

iOS 8 Features: Google Now’s new ‘find my car’ feature coming to iOS 8 | BGR http://t.co/AqZI50DC80




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 10:05AM

via IFTTT

“There is a challenge to reconcile the concept of national sovereignty with the internet model," http://t.co/PzR9Pa1fpC




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 06:00AM

via IFTTT

"Paranoid computer user's guide to privacy, security and encryption" http://t.co/x7pRXUYPi1 #Guide #Security




from Twitter http://ift.tt/1p6zYWJ



June 17, 2014 at 01:59AM

via IFTTT

Adobe Issues Security Updates for Flash Player, AIR http://t.co/KHEpRE3qSI




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 09:57PM

via IFTTT

Chrome, Firefox Updates Address Security Vulnerabilities http://t.co/WxpKgwAX2d




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 08:52PM

via IFTTT

Twitter Fixes TweetDeck XSS Security Vulnerability http://t.co/DT589IjACC




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 05:35PM

via IFTTT

New Zeus Variant Targeting Online Banking Users in Canada http://t.co/NhnvoiapWN #INFOSEC




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 03:52PM

via IFTTT

Nigerian man guilty of "phishing" http://t.co/eRyiLDVgtq #phishing




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 12:50PM

via IFTTT

Feedly DDoSed by ransom-threat crimes: 'We refused to give in' • The Register http://t.co/VJZ3UJpevY #DDOS #Feedly




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 12:05PM

via IFTTT

June 2014 Microsoft Patch Tuesday security updates | Threatpost | The first stop for security news http://t.co/RHlxV9F8Y2 #IE8Security




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 10:05AM

via IFTTT

Zeus Being Used In DDoS, Attacks On Cloud Providers http://t.co/DkZCjvn1Ku #DDOS #CloudSecurity




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 06:00AM

via IFTTT

Online gambling site hit by five-vector DDoS attack peaking at 100Gbps - SC Magazine http://t.co/qQvkYhZkGt #DDOS




from Twitter http://ift.tt/1p6zYWJ



June 16, 2014 at 01:59AM

via IFTTT

Red Button Attack Could Compromise Smart TVs | Threatpost | The first stop for security news http://t.co/XDIDRuVsem




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 09:57PM

via IFTTT

Zeus Malware Control Panel Vulnerable: Websense http://t.co/KN11GqQIM1




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 08:52PM

via IFTTT

Samsung and Marvel Entertainment Announce Global Brand Partnership http://t.co/WbjKjYgRLg #Samsung #MarvelEnt




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 08:19PM

via IFTTT

Food chain, PF Chang's, investigates possible card breach | Network World http://t.co/aoHWRE9wdt




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 08:14PM

via IFTTT

Clandestine Fox hackers spreading malware via Facebook, Twitter and LinkedIn http://t.co/Sj3GeATJSf




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 05:35PM

via IFTTT

Cyber Spies Targeting U.S. Defense, Tech Firms Linked to China's PLA: Report http://t.co/YN477PRAeb




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 03:52PM

via IFTTT

Hershey Medical Center notifies patients of potential health information breach | WPMT FOX43 http://t.co/Y65r9aireu




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 12:50PM

via IFTTT

Redmond is patching Windows 8 but NOT Windows 7, say security bods • The Register http://t.co/gJrVI6S7cS




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 12:05PM

via IFTTT

Cybercrime Remains Growth Industry With $445 Billion Lost - Bloomberg http://t.co/u00Gh6MvKT




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 10:05AM

via IFTTT

TweetDeck Scammers Steal Twitter IDs Via OAuth http://t.co/FjqI8ctGZi




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 06:00AM

via IFTTT

Possibly 350K ransomware infections, $70K earned, in Dropbox phishing scheme - SC Magazine http://t.co/Md7NaUedyY




from Twitter http://ift.tt/1p6zYWJ



June 15, 2014 at 02:10AM

via IFTTT

Taking the Smoke out of the Cloud

What Cloud technologies promise vs. what they currently deliver


June 9, 2014


These are a series on securing cloud computing environments and a brief overview of various cloud environments their strengths and weaknesses. "The Cloud" is a marketing term that describes the current trend in web hosting, which allows a customer to configure their own network and also allows a provider or hosting company to allow multiple customers to concurrently use the same pieces of technology. This will cover how a cloud platform is defined, logically how a cloud platform is built and their advantages.

The National Institute of Science and Technology (NIST) describes cloud computing as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." (NIST-800-145)

Characteristics of a cloud environment are the following: On-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Rapid deployment in a cloud platform means that creating a new server and pushing that new server into production is usually as easy as creating a file, however a specially formatted file.  That file will contain attributes of your server and will be booted and run in your network. Most cloud platforms use virtualized servers and virtualized networks to facilitate this ease of deployment. Broad Network Access means that these cloud platforms have always present network access for their service, so they are always "ON". This access is considered to be more of the service provider environment than the actual customer's cloud, but an integral part of a customer's service. Resource Pooling is allowing multiple customers to use the same hardware for their servers, same network hardware and same storage hardware, for example. This allows from a service provider perspective more customers per square foot. Resource sharing also creates new interesting security issues. Elasticity is similar to rapid deployment, only meaning new services can be deployed or expanded easily. Measured Service is where a hosting company can charge for the resource usage per customer whether that resource is network data bandwidth, server processing cycles or data storage, for example.

Finally NIST defines Service and Deployment models. I will review these to complete this introduction to cloud computing and cloud platforms, or just "The Cloud".

The most useful NIST Service models are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). SaaS is where a process that previously was sold as a shrink wrap package can be deployed to customers as an always available cloud service. Usually a customer will access this type of software via a web browser or software client. PaaS is where a service provider gives their customer access to create and manage their own cloud services by using a preset selection of development tools, and the resulting application will reside on a cloud network and servers. IaaS is where a hosting company allows a customer to provision network equipment and servers to create a customized cloud presence, though usually virtualized. SaaS products generally reside on PaaS and PaaS generally is built upon IaaS.

There are three deployment models of interest. These deployment models are characterized by whether a cloud infrastructure is located internally (private) to a customer, externally (public) or services are run both externally and internally (hybrid).

I will continue with describing cloud technologies and information security issues.

.wdnii.
© 2014 Norris Proprietaries Inc.