ShatterDOC Original Material

Sunday, August 24, 2014

White House Cybersecurity Leader: Technical Know-How's a Distraction

White House Cybersecurity Leader: Technical Know-How's a Distraction
GIZMODO | AUGUST 22, 2014
In much the same way that the best heart surgeons have never studied medicine and Supreme Court judges have never really read the law, Michael Daniel, the White House's cybersecurity coordinator thinks that "...being too down in the weeds at the technical level could actually be a little bit of a distraction" in his position.
After all, he explained, he doesn't "have to be a coder in order to do really well." And he is living proof: He's has no cybersecurity experience, is not a coder, and is not a software professional of any kind but he is the top cybersecurity guy in the White House.
gizmodo.com/white-house-cybersecurity-leader-technical-know-hows-a-1625439356

Willful ignorance isn't an argument favoring competence. Rather, it's the argument an arrogant, ignorant, hubris filled apparatchik uses when questioned about their competence.
Thanks, we think, DrT



GeekWire Radio: How cops are moving to the cloud, and what it means for public safety

GeekWire Radio: How cops are moving to the cloud, and what it means for public safety
GEEKWIRE | AUGUST 23, 2014
The recent chaos and tragedy in Ferguson, Mo., have highlighted the importance of accountability and transparency in everyday interactions between police and the public. Can technology make a difference?
Specifically cloud-based service and wearable cameras used by police departments.

Anyone think moving police information into the cloud might be a problem? Why does confidential police information need to even be connected to the Internet? What happens if police information is hacked or changed? SWAT shows up at the modified address looking for a murder suspect. What could possibly go wrong? Is the really an increase in public safety?
DrT hopes police information is better protected than most commercial business data.



Wyoming, a cloud leader? Take notes, America


Wyoming, a cloud leader? Take notes, America
INFOWORLD | AUGUST 19, 2014
Don't think of Wyoming as a special case -- citizens of all states would benefit from government's cloud shift. Outsourcing its two data centers is an interim step to eventually moving these IT systems to public cloud services. Where Wyoming goes, the rest of the states should follow.
http://akamai.infoworld.com/d/cloud-computing/wyoming-cloud-leader-take-notes-america-248619

Of course this will place Wyoming's Citizens information at great risk based on the current state of cloud security. David Linthicum's blog on cloud computing at InfoWorld.com is far more like advocacy and less like seasoned IT advice. This article doesn't mention the risk associated with cloud based systems or methods to mitigate such risks. We're, of course, a bit biased about ShatterDOC tech but before moving critical information to vender clouds a risk assessment is critical.
DrT Webteam


Monday, August 18, 2014

Apple and China : Encryption Plans

Apple begins storing users' personal data on servers in China
 
A source with knowledge of the situation said the encryption keys for Apple's data on China Telecom servers would be stored offshore and not made available to China Telecom.
Apple has said it has devised encryption systems for services such as iMessage that even Apple itself cannot unlock. But some experts expressed skepticism that Apple would be able to withhold user data in the event of a government request.

Thanks DrW : Cindi WebTeam


Add us to the skeptics. 


Friday, August 15, 2014

Protect your own communications

Visit PRISM Break to learn about available technical solutions. For secure text messaging and phone calls, see Open WhisperSystems. Visit the Tor Project to learn how to browse the web more anonymously. Keep an eye on the Dark Mail Alliance in the coming year for a new way to encrypt email.
http://divergentdave.github.io/nsa-o-matic/

Thanks JBT for this link

Alternatively use ShatterDOC to build your own private - very private - email like system. Watch for an announcement of our email replacement product!

QuickDrop Adds Instant Dropbox Uploads and Downloads to Chrome

QuickDrop Adds Instant Dropbox Uploads and Downloads to Chrome
LIFEHACKER | AUGUST 11, 2014
Chrome: Dropbox is one of our (and your) favorite cloud storage providers, but while it has clients for operating systems, there is nothing for the browser.
Convenient but is is safe?
Webteam


Edward Snowden Reveals NSA's MonsterMind Program

Edward Snowden Reveals NSA's MonsterMind Program
POPULAR SCIENCE | AUGUST 13, 2014
NSA's Utah Data Center A view of Monstermind's physical lair, photographed from an Electronic Frontier Foundation airship Parker Higgins, Electronic. As described, MonsterMind is a brute force approach to covert cyber war embodied in one program. In order to function, it scans a huge amount of electronic communication, all passing through the 247 acre facility, and looks for attacks. That's the scary part. The dumb part is how it automatically decides where to strike back. That's a problem, Snowden says, because the initial attacks are often routed through computers in innocent third countries. "These attacks can be spoofed," he says. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?"
http://www.popsci.com/article/technology/edward-snowden-reveals-nsas-monstermind-program

When there is no oversight the results are predictable. It's like letting the kindergartners run the grade school. Kindergartners with billions of our dollars and absolutely no accountability. This might make a great comedy if it wasn't terrifying.

Well, kinda thanks to DrT for sending us this article.
Cyndi Webteam

How to protect your finances from cyber hackers

How to protect your finances from cyber hackers
FORTUNE FINANCE | AUGUST 11, 2014

It seems that every few days we hear about another cyber-hacking case. Last week, reports of a Russian cybercrime group amassing 1.2 billion usernames...
http://fortune.com/2014/08/11/how-to-protect-your-finances-from-cyber-hackers/

The bottom line is - it's not easy. And mostly you'll find out after the fact. But the good news is you'll know about it. An possibly even soon enough to do something to stop it.
Mark WebTeam


FBI used drive-by downloads to track child porn suspects hidden on Tor | Naked Security

The agency not only cracked an unsecured forum for child abuse images hidden on Tor; they then took over three child porn sites and boobytrapped them with drive-by spyware downloads.

The FBI used Tor as a launchpad for what has to be considered malware: software that's downloaded silently without the consent of the target.

Do the means justify the ends, if the ends are catching child abusers?

Beyond that, this case represents yet another abuse of the anonymising network, which strives to shield people, be they up to good or not, from surveillance and detection.

http://nakedsecurity.sophos.com/2014/08/06/fbi-used-drive-by-downloads-to-track-child-porn-suspects-hidden-on-tor/

4 cloud horror stories -- and how to survive them

4 cloud horror stories -- and how to survive them
INFOWORLD | AUGUST 11, 2014

Here are four cloud horror stories along with spoilers, so you can make it out alive.
While vendors claim that cloud services are secure and reliable, that's not always the case. A better way than relying or vendor promises? Make sure your migration plans, budgets, existing infrastructure, security and any ancillary services all match up before making the jump to the cloud.
Another thing you should do is secure your data with ShatterDOC.
Thanks DrT - WebTeam


Wonder if you're a victim of the "billion password" breach? Pay $120 to find out

Wonder if you're a victim of the "billion password" breach? Pay $120 to find out
And another scam sucks money from the uninformed.
This time with the help of the New York Times.

HP finds that “Internet of Things” gadgets are sitting ducks | Naked Security

According to a new report (PDF) from HP Security Research, those smart TVs, those overly intelligent thermostats, and those entirely too spam-spewing refrigerators (email-not-lunch-meat) are all pockmarked with security and privacy holes and probably plotting against us right now.
HP found that 7 out of the 10 internet-enabled devices they tested are vulnerable to some form of attack.
http://nakedsecurity.sophos.com/2014/08/05/hp-finds-that-internet-of-things-gadgets-are-sitting-ducks/


Sunday, August 10, 2014

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security

Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
But of course they are just protecting us. 

Synology NAS devices targeted by hackers, demand Bitcoin ransom to decrypt files

Synology NAS devices targeted by hackers, demand Bitcoin ransom to decrypt files
EXTREMETECH | AUGUST 5, 2014

Synology is back in the spotlight for NAS trouble -- this time its devices are being ransomed for Bitcoin. The company has promised an update as soon. An exploit dubbed SynoLocker is locking NASes unless the owners pay a ransom fee to decrypt their files.
http://www.extremetech.com/extreme/187518-synology-nas-devices-targeted-by-hackers-demand-bitcoin-ransom-to-decrypt-files
Thanks MT


Why Google Just Bought a Company That Snoops on Your Chats

Why Google Just Bought a Company That Snoops on Your Chats
WIRED EPICENTER | AUGUST 6, 201
4
Google just bought another online communications channel it can fill with ads. .The tech giant confirms it has acquired Emu, a startup that offers a kind of instant messaging tool. The price was not disclosed, but Google's interest in the company isn't hard to divine: Emu has built a system that can monitor chats, infer what people are talking about, and insert relevant links—including ads.
http://www.wired.com/2014/08/google-is-excited-about-monitoring-chats/
That should make chat users feel great!
If they can insert ads then the tech can insert anything - including things you didn't actually say.
Try telling a judge "I didn't type that" when he has a hard copy transcript of your chat conversation.

OneDrive user arrested on child porn charges following tip by Microsoft

OneDrive user arrested on child porn charges following tip by Microsoft
GEEKWIRE | AUGUST 6, 2014
A Pennsylvania man has been arrested on child pornography charges after Microsoft tipped off law enforcement that he had uploaded a pair of illicit images to his OneDrive account, according to a probable cause affidavit obtained by The Smoking Gun. Microsoft was able to detect the images through the use of PhotoDNA, technology that it developed alongside Dartmouth College, which is designed to make it possible to identify images and tip law enforcement without requiring staff to look at the offending files. The same technology is used by a variety of tech companies, including Facebook and Twitter.
Of course Microsoft and LEOs don't report the false positive rate... 
Good thing such an error couldn't ruin your life.


5 reasons Internet crime is worse than ever

5 reasons Internet crime is worse than ever
INFOWORLD | AUGUST 5, 2014
Why does Internet crime remain a menace? These five reasons have enabled us to accept it -- but that complacency may not last
http://www.infoworld.com/d/security/5-reasons-internet-crime-worse-ever-247649
The real question is why aren't governments doing something about it?
Perhaps red light cameras are just easier.



Microsoft Azure, the world's biggest cloud? Someone's fudging

Microsoft Azure, the world's biggest cloud? Someone's fudging
INFOWORLD | AUGUST 5, 2014
Microsoft Azure is on a tear, but only bad math makes Azure's numbers add up to the industry's largest cloud.
http://www.infoworld.com/t/cloud-computing/microsoft-azure-the-worlds-biggest-cloud-someones-fudging-247655

Wait! Microsoft fudging the numbers? Tell me it isn't so.

Evidence of another Snowden-like mole is worrying Feds

It looks like there's at least one more mole in their midst.
The proof: an article posted Tuesday by The Intercept, a site run by Snowden leak publisher Glenn Greenwald. The article references classified government documents obtained from somebody The Intercept describes as a "source in the intelligence community".

Helping the enemy or fighting oppression?


Father of PGP encryption: Telcos need to get out of bed with governments
Phil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the "crypto wars" of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a "munition" and shut down the Clipper Chip program—an effort to create a government-mandated encryption processor that would have given the NSA a back door into all encrypted electronic communication.

How US and UK spy agencies defeat internet privacy and security

Revealed: how US and UK spy agencies defeat internet privacy and security
• NSA and GCHQ unlock encryption used to protect emails, banking and medical records
• $250m-a-year US program works covertly with tech companies to insert weaknesses into products
• Security experts say programs 'undermine the fabric of the internet'
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

No weakness here...

Wednesday, August 6, 2014

Are users hoarding data? Here's where to put it | Data Center - InfoWorld

Are users hoarding data? Here's where to put it | Data Center - InfoWorld
Contains a lot of interesting advice. Perhaps the best is "One of the most useful tools in the battle over unreasonable data retention is a simple script that walks through a file tree and records every directory with an atime of greater than n years, and calculates the space savings if that data was moved to a graveyard array or permanently deleted. Some of these results will be shocking, especially if the shares have been around for a while. Finding 3TB that hasn't been touched since 2007 in an 8TB array is not unusual."
http://m.infoworld.com/d/data-center/are-users-hoarding-data-heres-where-put-it-245532
But it you're moving to the Cloud or to a physically insecure location and your data contains business or personal sensitive information, consider ShatterDOC.
ShatterDOC Information Team


Sex, spies, and the cloud: NSA revelations continue to weaken confidence

Sex, spies, and the cloud: NSA revelations continue to weaken confidence
INFOWORLD | JULY 8, 2014
Washington Post investigation asserts that the NSA collects data mostly from ordinary citizens, not potential terrorists
http://www.infoworld.com/d/cloud-computing/sex-spies-and-the-cloud-nsa-revelations-continue-weaken-confidence-245658
ShatterDOC Information Team


US makes it so easy for foreign invaders

http://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html

Grad student has already made a mark in consumer privacy, U.S. spying

His research showed that the NSA's bulk collection of telephone metadata is far more invasive than officials let on. He and a research partner found that the seemingly bare-bones data could be used to show with some certainty callers' religious affiliations, medical conditions and, in one case, a woman seeking an abortion.

http://www.latimes.com/business/la-fi-himi-mayer-20140601-story.html

So, just another reason to protect your personal, private, data!

Two glimmers of hope for enterprise security

Two glimmers of hope for enterprise security
INFOWORLD | JULY 21, 2014
Will the endless stream of security compromises ever stop? No single security product can deliver salvation, but two new solutions, PingID and Tanium, show real promise
http://www.infoworld.com/t/security/two-glimmers-of-hope-enterprise-security-246622


Don't believe false alarms about Docker containers


Don't believe false alarms about Docker containers
INFOWORLD | JULY 22, 2014
Despite what some people say, Docker containers have plenty of resiliency options when needed. [Really?]
As Docker picks up steam, a few people are suggesting that this approach to cloud workload portability and management may have an Achilles' heel.
Docker containers sit on a shared Linux implementation, which creates the potential for significantly more vulnerabilities that can affect the operation of every container on a server, especially if the underlying OS goes down. In such an event, all containerized workloads could go down as well.

US government says online storage isn't protected by the Fourth Amendment


US government says online storage isn't protected by the Fourth Amendment
ENGADGET | JULY 14, 2014
A couple months ago, a New York judge ruled that US search warrants applied to digital information even if they were stored overseas. The decision cam...
www.engadget.com/2014/07/14/fourth-amendment-online-data/

Thanks Apple


Apple May Be Spying On You Through Your iPhone
 
Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.

Thanks Dr W
We thought Apple was our friend.
 


USB Stick Security is Fundamentally Broken

Why the Security of USB Is Fundamentally Broken
 
Any time a USB stick is plugged into a computer, its firmware could be reprogrammed by malware on that PC, with no easy way for the USB device's owner to detect it. And likewise, any USB device could silently infect a user's computer. "It goes both ways," Nohl says. "Nobody can trust anybody."
 
Trust must come from the fact that no one malicious has ever touched it," says Nohl. "You have to consider a USB infected and throw it away as soon as it touches a non-trusted computer. And that's incompatible with how we use USB devices right now."
 
The alternative is to treat USB devices like hypodermic needles.

Thanks Dr.A
 


Snooping on wearable tech with Raspberry Pi

Wearable users tracked with Raspberry Pi


Researchers could collect enough information to get the databases storing the data to execute commands.
 
People who use wearable gadgets to monitor their health or activity can be tracked with only $70 (£40) of hardware, research suggests.

The work, carried out by security firm Symantec, used a Raspberry Pi computer to grab data broadcast by the gadgets.

The snooping Pi was taken to parks and sporting events where it was able to pick out individuals in the crowds.
 
In addition, the research team looked at the apps associated with some activity monitors or which use a smartphone to gather data. About 20% of the apps Symantec looked at did nothing to obfuscate data being sent across the net even though it contained important ID information, such as name, passwords and birth date.


New malware can live inside any USB device undetected

New malware can live inside any USB device undetected
ENGADGET | JULY 31, 2014
It turns out that the stalwart USB thumbstick, or any universal serial bus device, isn't as trustworthy as once thought. A pair of security researcher...
http://www.engadget.com/2014/07/31/badUSB-malware/

Thanks Dr A. Now no one will sleep tonight!

CLOUD SECURITY INNOVATORS – Q+A WITH JEFF BLAIR, CISO, CAA


CLOUD SECURITY INNOVATORS – Q+A WITH JEFF BLAIR, CISO, CAA
CLOUD SECURITY ALLIANCE | JULY 31, 2014
By Brandon Cook, Director of Product Marketing, Skyhigh Networks We are thrilled to feature a Q+A session with Jeff Blair, CISO
Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month's installment of the Cloud Security Innovators blog series. Jeff works for CAA, which represents the world's biggest athletes and movie stars.  In this fast-paced and creative environment, Jeff is a maverick, helping lead the movement to the cloud with an innovative approach to securing cloud data and systems.


Do ordinary Citizens need to protect their data?

In NSA-intercepted data, those not targeted far outnumber the foreigners who are

Examples from the Washington Post seem to indicate that the answer is "yes".

"Among the [material collected by NSA] are medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren.

“None of the hits that were received were relevant,” two Navy cryptologic technicians write in one of many summaries of nonproductive surveillance.

"The NSA treats all content intercepted incidentally from third parties as permissible to retain, store, search and distribute to its government customers."

http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html

Of course you need to protect your data. You close your window blinds at night don't you?

New Study Highlights the Risks of Bring Your Own Cloud

New Study Highlights the Risks of Bring Your Own Cloud
CLOUD SECURITY ALLIANCE | JULY 2, 2014

By Hormazd Romer, Senior Director, Product Marketing, Accellion A new study by the Ponemon Institute, The Insider Threat of ...
Putting insecure information in insecure places is a disaster just waiting to happen. And, you won't have to wait long!

The EPA doesn't know what clouds it has -- and neither do you | Cloud Computing - InfoWorld

The EPA doesn't know what clouds it has -- and neither do you | Cloud Computing - InfoWorld
the Environmental Protection Agency (EPA) doesn't know how many cloud computing contracts it has or how secure they are, according to a recent audit by the agency's inspector general, in a report released last week. In at least one instance, the EPA may not have had access to a subcontractor's cloud for investigative purposes. Worse, that same subcontractor was not compliant with the Federal Risk and Authorization Management Program (FedRAMP), which sets security standards for cloud providers.
http://m.infoworld.com/d/cloud-computing/the-epa-doesnt-know-what-clouds-it-has-and-neither-do-you-247150

And some folks think the federal government can protect them. Hey, the feds don't even know what clouds it's using!

Tor Anonymity Service Confirms Deanonymizing Attacks, Urges Users To Upgrade Software; What You Need To Know About The Attacks

Tor Anonymity Service Confirms Deanonymizing Attacks, Urges Users To Upgrade Software; What You Need To Know About The Attacks
IDIGITAL TIMES | JULY 30, 2014
Tor anonymity service was attacked and user identities may have been revealed, says Tor project admin. What happened and who is behind the attacks? ...
http://www.idigitaltimes.com/articles/24097/20140730/tor-attack-revealed-anonymous-users-identities-who.htm

The hits keep rolling in.

THE 20 TOTALLY MOST POPULAR CLOUD SERVICES IN TODAY’S ENTERPRISE

THE 20 TOTALLY MOST POPULAR CLOUD SERVICES IN TODAY'S ENTERPRISE
CLOUD SECURITY ALLIANCE | AUGUST 4, 2014

By Brandon Cook, Director of Product Marketing, Skyhigh Networks
CIOs, CISOs, analysts, journalists, and employees alike are …like…the most popular and frequently used in the enterprise. This type of information is useful in that it indicates employee demand for services, divulges potential locations of corporate data in public clouds, and highlights adoption trends.
https://blog.cloudsecurityalliance.org/2014/08/04/the-20-totally-most-popular-cloud-services-in-todays-enterprise/

ShatterDOC works with most cloud providers out of the box. And, we can customized a solution just for you!

Russian gangs take 1.2B passwords, 500M email addresses in biggest Web heist ever

Russian gangs take 1.2B passwords, 500M email addresses in biggest Web heist ever
VENTUREBEAT | AUGUST 5, 2014

Image Credit: illustration via Tom Cheredar Security researchers are calling it the biggest theft of user data ever. A Russian criminal group successfully lifted 1.2 billion passwords and 500 million email addresses from 420,000 websites, Hold Security, an Internet security company said today.
venturebeat.com/2014/08/05/russian-gangs-take-1-2b-passwords-500m-email-addresses-in-biggest-web-heist-ever/

Now this is frightening!

Mobile Cloud Security Company BitGlass Raises $25 Million From NEA, Singtel, Norwest Venture Partners,

Mobile Cloud Security Company BitGlass Raises $25 Million From NEA, Singtel, Norwest Venture Partners,
TECHCRUNCH | AUGUST 4, 2014
http://pulse.me/s/1ZgpCy
BitGlass has announced a fresh $25 million in Series B funding today. The enterprise mobile cloud security solution had already raised $10 million in ...
http://techcrunch.com/2014/08/05/mobile-cloud-security-company-bitglass-raises-25-million-from-nea-singtel-norwest-venture-partners

Google scans your Gmail inbox for child porn to help catch criminals, but don’t worry about loss of privacy (yet)


Google scans your Gmail inbox for child porn to help catch criminals, but don't worry about loss of privacy (yet)
EXTREMETECH | AUGUST 5, 2014
Last week, a man in Texas was arrested by the police for sending child porn to a friend email. This isn't something we'd usually report on, except in...
Google employs and automated system that checks the cryptographic hash (think of it as a digital fingerprint) of every attachment that traverses its servers. Exact technical details of Google's automated system aren't known, but it almost certainly works in the same way as Dropbox's automated copyright/piracy prevention system.

www.extremetech.com/computing/187521-google-scans-your-gmail-inbox-for-child-porn-to-help-catch-criminals-but-dont-worry-about-loss-of-privacy-yet

With a fresh $25M, Bitglass is ready to protect enterprise cloud and mobile assets

With a fresh $25M, Bitglass is ready to protect enterprise cloud and mobile assets
VENTUREBEAT | AUGUST 5, 2014
Above: Nat Kausik, CEO of Bitglass. 
In the modern, mobile- and cloud-based world, IT departments are no longer in control. Bitglass has a way to deal with that. "The corporation doesn't own the network, they don't own the apps, and they don't own the device," Bitglass vice president Rich Campagna says.
venturebeat.com/2014/08/05/with-a-fresh-25m-bitglass-is-ready-to-protect-enterprise-cloud-and-mobile-assets/

Wow! Folks are pouring money into cloud protection.

The right cloud for the job: Multicloud database processing is here

The right cloud for the job: Multicloud database processing is here
INFOWORLD | AUGUST 5, 2014
Today's one-size-fits-all database processing will give way to a cheaper, but more complex heterogeneous approach. This idea has gotten new attention because it is the core idea behind MapReduce, the parallel processing model used by Hadoop in big data analytics. These types of distributed workloads have been used for years, typically with a homogeneous server cluster, meaning it works across lots of the same servers. That homogeneity restricts you to one server cluster or one cloud -- thus, one resource type and cost. But not any more.

Why you need to deploy DNSSec now | Security - InfoWorld

Why you need to deploy DNSSec now | Security - InfoWorld
The Domain Name System -- the distributed network of servers that reconciles the domain names in URLs and email addresses to numerical IP addresses -- is behind every successful Internet transaction. Unfortunately, due to a longstanding vulnerability, it's also behind some of the Internet's most dangerous hacks -- despite the fact that a fix, DNSSec (Domain Name System Security Extensions), has been available for years.

m.infoworld.com/t/security/why-you-need-deploy-dnssec-now-247654

webteam

Build your own private cloud

Build your own private cloud
INFOWORLD | AUGUST 4, 201
Borrowing from public cloud architecture and technologies, the private cloud weaves a new management layer around virtualized data center systems, the private cloud weaves a new management layer around virtualized data center systems.
---------------
And ShatterDOC can ensure that your cloud is secure!
email us: corporatesolutions@shatterdoc.com. Our parent company can help you build a corporate wide secure system.

www.infoworld.com/d/cloud-computing/build-your-own-private-cloud-246819




FortyCloud Teams With Rackspace To Manage Cloud Security

FortyCloud Teams With Rackspace To Manage Cloud Security
TECHCRUNCH | AUGUST 3, 2014
FortyCloud, an Israeli cloud security service, announced today it was joining the Rackspace Marketplace to provide Rackspace customers with cloud security.
techcrunch.com/2014/08/04/fortycloud-joins-rackspace-marketplace-to-manage-cloud-security
Or you could choose a US company, deploy ShatterDOC technology, and be in control of your security.