ShatterDOC Original Material

Thursday, July 3, 2014

New Study Highlights the Risks of Bring Your Own Cloud


CLOUD SECURITY ALLIANCE | JULY 2, 2014
A new study by the Ponemon Institute, The Insider Threat of Bring Your Own Cloud (BYOC), analyzes the risks of enterprise employees using cloud services without the permission or oversight of the IT department—a practice that the study's author calls "Bring Your Own Cloud (BYOC)."
https://blog.cloudsecurityalliance.org/2014/07/02/new-study-highlights-the-risks-of-bring-your-own-cloud/

Original study: http://www.computerworlduk.com/white-paper/cloud-computing/3501984/the-insider-threat-of-bring-your-own-cloud-byoc/

ShatterDOC Blog Team

Not exactly Cloud computing but important none-the-less


Your Android May Be Broadcasting Your Location (and How to Stop It)
GIZMODO | JULY 3, 2014
Do you own an Android device? Is it less than three years old? If so, then when your phone's screen is off and it's not connected to a Wi-Fi network, ..
http://gizmodo.com/your-android-may-be-broadcasting-your-location-and-how-1599579458

Thanks DrT
Blog Team

Cybersecurity companies are treating you like an idiot. Here’s an alternative



VENTUREBEAT | JULY 2, 2014
Big Cyber is preaching a puritanical sermon: "We know better; you're too stupid; we'll handle it for you." That's the strident opinion of Surfwatch L...
venturebeat.com/2014/07/02/cybersecurity-companies-are-treating-you-like-an-idiot-heres-an-alternative/venturebeat.com/2014/07/02/cybersecurity-companies-are-treating-you-like-an-idiot-heres-an-alternative/

ShatterDOC Information Team
"Cyndie"



Microsoft Pushes Back against NSA Demands


[MS Chief Attorney's]  comments came as the tech giant is pushing back against a U.S. demand that Microsoft hand over data from a customer in Ireland.
“We are in a business that relies on people’s trust,” said Smith. “We’re offering a world where you should feel comfortable about storing (your information) in the cloud. You need to have confidence that this information is still yours.”

One of the solutions he offered was a sort of information dashboard, where each individual could see where private information was stored and who had access to it.