Ping Service
Feedback Forms

Cloud Computing Data Breaches – The Facts

Every year the buzz grows around the Verizon RISK team’s release of its annual Data Breach Investigations Report (DBIR).

As an incident response professional, the DBIR is one of my favorite reads. This year’s DBIR included analysis of security concerns in cloud computing. So for those of you interested in cloud security, this is the blog post for you!

The report, on page 40 states:

“Because working definitions of “the cloud” are legion, it can be difficult to answer questions about how this paradigm factors into data breaches. Do we see breaches that compromise assets in an externally-hosted environment that is not managed by the victim? Yes; absolutely. Do we see successful attacks against the hypervisor in the wild? No; not really.”

Read the rest of this entry »

What is Corporate and Business Identity Theft and What Are the Risks and Damages Associated with It?

The yellow fever outbreak of summer 1798 was the worst in Philadelphia’s history. Over 5,000 residents were infected, and nearly 1,300 died, causing even President Washington to flee. On the night of September 1st, 1798, the vault at Carpenter Hall was breached and the then-massive amount of $162,821 went missing. This first bank robbery in the United States, attributed as an “inside job”, ushered in an era of robberies that turned criminals into celebrities. Jesse James, Bonnie and Clyde, and John Dillinger have become legends. At present, the risk of yellow fever has been mitigated due to vaccines. The risk of bank vaults being physically robbed similarly has been reduced.

Read the rest of this entry »