Remove Authentication Remove Fractional CTO Remove Information Security Remove Policies
article thumbnail

Top 10 Quotes About Cloud Security

SecureWorld News

So every breach you've seen associated with them, and it's been billions of records over the last couple years, is because somebody accidentally assigned too permissive a policy to that storage bucket. Listen to the rest of our Fireside Chat podcast with Dr. Larry Ponemon on the state of information security: #5.

Cloud 52
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

The National Cyber Security Hall of Fame is composed of individuals who collectively invented the technologies, created awareness, promoted and delivered education, developed and influenced policy, and created businesses to begin addressing the cyber security problem. Lipner is named as an inventor on 12 U.S.

Security 150
article thumbnail

The Sony Hack in Context

CTOvision

In short, as long as our information systems remain porous, opportunities for sophisticated foreign intelligence services to secretly influence US policy will abound. Criteria might include such things as double authentication, end point security, heuristic malware detection technology etc.