Visibility

We warned you!

Ipswitch has been cautioning companies about the dangers of private/confidential information being sent through Google (and other hosted and person-to-person services), both from a security and a responsibility perspective. Last week’s GMail hack further drives home the point that organizations must proactively manage and have visibility into what information is […]

Also posted in Cloud Computing, Data Breach, Enforcement, File Security, Integration, Person-to-Person, Security, Webcasts | Tagged , , , , | Leave a comment

Google versus China – Is your company at risk?

Google revealed yesterday a targeted phishing attack from China against hundreds of GMail users, including government officials and military personnel.  The FBI, Department of Homeland Security, and the White House National Security Council are all participating in an investigation of the cyber attack. My hope is that this breach will […]

Also posted in Auditing, Data Breach, Enforcement, File Security, Ipswitch, Managed File Transfer, Person-to-Person, Security | Tagged , , , , , , , , , | Leave a comment

Cloud security is the new great debate

Last week I ranted a bit about the importance of governing your cloud vendors.  At about the same time, Ipswitch’s Frank Kenney participated in a panel discussion on cloud security at the Interop conference in Las Vegas. As you know, there is great debate over whether cloud services are secure […]

Also posted in Cloud Computing, File Security, Managed File Transfer, Security | Tagged , , , , , , , , , , | Leave a comment

Cloud platform vendors limit their responsibility

Take a quick read of Google’s Terms of Service or Amazon EC2’s SLA Exclusions and you’ll see examples of how cloud platform vendors limit their governance and control responsibility. So what happens when you put your business in the cloud and then the cloud goes down?  Just ask Foursquare, Hootsuite, […]

Also posted in Cloud Computing, Managed File Transfer, MessageWay, Security | Tagged , , , , , , , , , , , , , | Leave a comment

Takeaways from Verizon’s 2011 Data Breach Investigations Report

Many thanks to the Verizon RISK Team (along with the U.S. Secret Service and the Dutch High Tech Crime Unit) for publishing their 7th annual analysis of data breaches.  Compromised data continues to plague organizations worldwide, and studies like the 2011 Data Breach Investigations Report can help us all avoid […]

Also posted in Compliance, Data Breach, Enforcement, File Security, Managed File Transfer, Management, Security | Tagged , , , , , , , , , , , | Leave a comment

A Security Hole – is Dropbox Dropping the Ball?

Security researcher Derek Newton and a few Dropbox users have found a significant security hole in Dropbox. They published their results and Dropbox responded. Dropbox’s response is not adequate.  It’s not enough for them to bury their head in the sand and to say that this security gap is not […]

Also posted in Data Breach, Enforcement, File Security, Managed File Transfer, Security | Tagged , , , , , , | Leave a comment

Epsilon breach affects millions of people, including me.

I, like many others, have received security notifications about the Epsilon data breach.  In the last 48-hours I have been sent email warnings from 8 companies that I trusted with my personal information – Banks, retailers and hotels. These companies entrusted my private contact information to Epsilon, a 3rd party […]

Also posted in Data Breach, Enforcement, File Security, Security | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment