Encryption in the Spotlight due to Vulnerable Android Apps

Last week, Ars Technica’s Dan Goodin published a story detailing how downloaded Android applications have the potential to expose the sensitive personal data of more than 185 million users. Vulnerabilities due to inadequate or incorrect use of SSL/TLS protocol libraries expose everything from online banking and social networking credentials to e…

Defining the Enterprise Cloud Service – Part 6: Strong Encryption Throughout

During the past few weeks, I’ve written about what it takes to build a cloud service that’s ready for the enterprise. Essentially, there are three characteristics that set true enterprise cloud services apart from their consumer counterparts: Security. Reliability. Trust. When evaluating an enterprise cloud service for those characteristics, there…

Own Your Own Availability: Zero Downtime During the AWS Outage

The East Coast is still reeling from a powerful storm that swept through the region on Friday, but the storm’s effects reverberated beyond the devastation in the Mid-Atlantic. On Friday, a lighting storm partially knocked out one of Amazon’s AWS availability zones in Virginia — and companies all over the globe felt the pinch. Netflix, Instagram,…

Archive

Follow Us
Share on Linkedin Share on Youtube