Monday, January 25, 05:46
Home security After the breach of Capital One, big companies should ...

After the Capital One breach, should big companies fear the public cloud?

You will find it difficult to find a company more committed to using the so-called public Cloud than Capital One. America's seventh largest bank has spent years clearing its data centers - from eight in 2014 to no (data center) scheduled by the end of 2020 - and will rely on Amazon Web Services resources for computers and data storage. But now, after a data breach affecting 106 million North Americans, people are wondering if Capital One represents a security warning story in cyberspace.

Capital One

To escape through Capital One systems, a hacker allegedly exploited a "wrong firewall". Basically, the hacker, it just seems like an open door. Both Capital One and Amazon stressed that "this kind of vulnerability is not specific to the cloud".

However, some experts - such as Evan Johnson, a security director - say that the technical installation of AWS made the breach "much worse". AWS (Amazon Web Services) is particularly sensitive to “forgery of application by server", Says Johnson, in which a hacker mocks a server on the connection where it should not, allowing data theft.

Despite the criticism, the breach of Capital One “does not prove that in cloud "It's wrong," said Glenn O'Donnell, a Forrester VP. "What it proves is that you have to have the right controls in place in terms of it security and governance. ”

Ed Amoroso, former security officer for AT&T, agrees that for most businesses, the infrastructure for off-loading in the cloud remains more secure than their own management.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


How to find your orders in the Amazon app

If you frequently use the Amazon app to buy items, you may find it convenient to see a list of all ...

Automatically move Gmail messages to a different tab

Often the emails we receive can fill our inbox, especially if we use our e-mail for business purposes ....

Google: How to view and delete the data it collects for you

There are some companies that people do not seem to trust much - one of them is Google. The reason...

Signal: How to check if your messages are private and secure?

The Signal messaging application has suddenly gained a large number of new users, which is due to the recent "scandal" of WhatsApp, which announced ...

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...

Elon Musk: Gives $ 100 million for best CO2 capture technology Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...