The next steps for the EU and US post-Privacy Shield: How can Europe win the digital race?

Opinion It has been seven years since Edward Snowden exposed the level of surveillance by US intelligence agencies that one might have rather expected from totalitarian countries. Petabytes of private or company data – no matter from which country – are made available to US authorities by default without suspect or a court decision.

While little is known publicly about current practice, it would certainly be more than surprising if the powers and capabilities of the US...

Privacy Shield ruling could lead to dark clouds ahead for hyperscalers, advocates warn

The ending of the Privacy Shield agreement by the European Court of Justice (ECJ) could have serious ramifications for the major hyperscale cloud providers, according to privacy activists.

Privacy Shield is an EU-US agreement which 'provides companies on both sides of the Atlantic with a mechanism to comply with data protection requirements in support of transatlantic commerce', in the words of the framework's website statement.

Max Schrems, a leading privacy advocate,...

Why machines protecting themselves is the future of cybersecurity

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves.

Any nation's digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalise on the...

Q&A, Simon Cuthbert, Tenfold: On the problem of over-privilege and IAM best practices

To misquote Benjamin Franklin, in this world nothing can be certain except death, taxes, and security being the biggest concern for cloud migration. Flexera's most recent State of the Cloud report last month laid it bare; more than four in five (81%) enterprises said security was the main challenge, ahead of managing spend and governance.

The latter two areas are, naturally, also linked to security. But as cloud workloads become increasingly complex, and as multi-cloud moves from...

The rise of obfuscated VPN servers and their use cases: A guide

VPNs continue to be used extensively as tools to protect data security and user privacy. Yet, as to be expected, there are many providers available, and many options within those providers – so buyer confusion can reign.

A virtual private network, by itself, is the secure, private connection between your device and your intended destination. When dealing with VPN servers, the options start to...

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data...

For better or for worse: Why your brand reputation is hitched to your ability to manage and protect data

The potential benefits of technology to change and improve lives are clear for all to see. At an individual level, wearable devices can help better manage health, home sensors can reduce your energy use and costs, and analytics can hone services to meet your every need. At an organisational level, digital transformation can not only boost efficiency and productivity, but it can change the way that whole industries operate and allow organisations...

Amid various privacy scares – yes, you can collaborate and communicate securely in the cloud

Last week, Facebook announced the launch of Portal, a voice-activated smart home camera device. Considering the recent data breach the company suffered, the tech press response to Portal ranged from bafflement to incredulity.

In response, Facebook senior exec Andrew Bosworth insisted< all processing was done locally on the device – so no information was uploaded to the cloud, or stored on Facebook servers. But is this sensible policy or scaremongering?

This article...

WikiLeaks claims to publish confidential AWS data centre location information

WikiLeaks has published what it claims is a 'highly confidential' document outlining the addresses and operational details of Amazon Web Services (AWS) data centres.

The whistle-blowing organisation claims to have published the document, originating from late 2015, as an attempt to shed light on the 'largely hidden' nature of cloud infrastructure locations.

"While one of the benefits of the cloud is the potential to increase reliability through...

Keeping secrets: Tips for protecting your data in AWS S3

Amazon Web Services is the juggernaut in the cloud provider space, and with any piece of technology comes the need for proper security. In this regard, AWS is no exception. In this piece, we will shortly discuss the latest breaches of public S3 buckets, provide an overview of the two ways to protect data in these storage spaces, and discuss how the new Amazon Secrets Manager utility can assist in securing AWS cloud applications.

Recent breaches

There have been a couple of recent...