Much of the discussion about cloud services remains focused on the needs of less-mature organizations and on technical rather than business considerations. Debate concentrates on whether to move to the cloud, which workloads are best to “lift and shift” from a cost, security and compliance perspective or how to avoid supplier lock-in, currently one of the biggest concerns when moving to the cloud.
Utah Gov. Herbert signed off this week on a bill that positions Utah as the state with the strongest data privacy laws in the country when it comes to law enforcement accessing electronic information. The bill, HB57, establishes that a warrant must be secured before law enforcement may access electronic data held by a third party, thus protecting information passed to a third party such as Dropbox or Google Drive.
Just as there are many tasks in electronic discovery, many times there are multiple technologies and platforms involved in the complete electronic discovery process. When there are multiple technologies and platforms involved, data must be transferred from disparate technologies and platforms to other disparate technologies and platforms. This data transfer can be considered a risk factor that impacts the overall electronic discovery process.
The Cloud Security Alliance (CSA) today announced the release of the CSA IoT Controls Framework, its first such framework for IoT which introduces the base-level security controls required to mitigate many of the risks associated with an IoT system operating in a range of threat environments.
The NIST cybersecurity practice guide, Mobile Device Security: Cloud and Hybrid Builds, demonstrates how commercially available technologies can meet your organization’s needs to secure sensitive enterprise data accessed by and/or stored on employees’ mobile devices. The document proposes a reference design on how to architect enterprise-class protection for mobile devices accessing corporate resources.
While blockchain technology has been long touted for its security, under certain conditions it can be quite vulnerable. Sometimes shoddy execution can be blamed, or unintentional software bugs. Other times it’s more of a gray area—the complicated result of interactions between the code, the economics of the blockchain, and human greed. That’s been known in theory since the technology’s beginning. Now that so many blockchains are out in the world, we are learning what it actually means—often the hard way.
In a sensational test of technological independence, Russia is making plans to cut off its internet from the rest of the world, with a giant ‘unplugging’ experiment that will affect over 100 million Russian internet users. The contentious plan is expected to be enshrined in law soon, and although nobody knows just when the great unplugging will take place, it should happen imminently.
The California Consumer Privacy Act of 2018 creates sweeping new requirements concerning the collection, maintenance, and tracking of information for both employees or customers who are residents of California. Companies with employees or customers in California need to take stock of the information they are processing that could qualify as “personal information” for California residents, and they need to begin establishing mechanisms for compliance before the end of 2019.
The Data Protection Authority (DPA) of the German state of Bavaria announced it was considering fining a number of companies under the GDPR for their website cookie practices. The Bavarian DPA’s action potentially signals that cookies, user tracking, and online advertising are not a ‘tech industry issue,’ but instead a priority issue for companies irrespective of their industry – and one that can carry GDPR fine risk.
Google Cloud developer advocate Allen Day and his team of open source developers from around the world are launching a number of tools designed to do to blockchain what Google search did to the internet.