Access and Feeds

Blog Archives

The Spectre and Meltdown Chip Security: How Bad is it?

By Dick Weisinger

Insecure software is usually the root of security vulnerabilities, but last week two serious hardware vulnerabilities were announced: Spectre and Meltdown. What is Spectre? Spectre is a computer chip flaw that can allow hackers to steal information from otherwise error-free

Security: Worst Year Ever for Data Losses Caused by Poor Security

By Dick Weisinger

2017 has turned out to be a year of wake up for companies about the effectiveness of their data security policies. Data breaches skyrocketed in 2017 by 305 percent over the same period in 2016, according to theĀ Q3 2017 Data

Cloud Computing Security: Multi-Cloud Infrastructure Provides Diversification but with Added Security Complexity

By Dick Weisinger

While currently 60 percent of businesses are using a single cloud provider, others see advantages to using more than a single provider to avoid having a single point of possible disruption. While diversification has advantages on paper, a multi-cloud infrastructure

Cloud Security: Top 12 Threats to Cloud Computing

By Dick Weisinger

The Cloud Security Alliance (CSA) recently identified the top 12 things that can adversely impact cloud computing. The following items appeared in the CSA report “The Treacherous 12: Top Threats to Cloud Computing“: Data Breaches Weak Identity, Credential and Access

Security Breaches: Third-Parties Often to Blame in Increasing Number of Hacking Incidents

By Dick Weisinger

Recently, data breaches and hacks are being announced on a regular, if not daily basis. There was the Equifax hack. The SEC. Yahoo’s disclosure that their hack was even bigger than originally announced. Forrester Research announced that their industry research