Office 365 third-party risks and configuration guidance

More organizations are relying on third-party companies to help them move to the cloud, such as Microsoft’s popular Office 365 (O365) email services. A new report highlights some of the risks when moving to the cloud and potential configuration vulnerabilities.

Continue Reading →

Nearly 800M email records exposed in massive data breach

A massive data breach dubbed “Collection #1” exposed nearly 800 million email addresses and millions of passwords. Security expert Troy Hunt was alerted of the leaked data made available for free download from popular MEGA cloud storage service. The data consisted of over 12,000 separate files and more than 87GB of data.

Continue Reading →

Hardware-based Security Controls for IoT

In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT report, to include hardware-based controls to enhance security of IoT products. The CSA IoT Working Group report, is titled “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.”

Continue Reading →

How to Establish a Framework, Platform Security and Data Protections for IoT

In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT Working Group report, “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products,” to include guidance on how to establish a framework, platform and privacy protections to enhance security of IoT products.

Continue Reading →