Monthly Archives: May 2015

Venom Vulnerability Exposes Cloud Insecurities

By | Cloud Storage, Corporate Compliance, Data Security, Enterprise Collaboration, Facts About the Cloud, Information Technology | No Comments

When you store your data in the cloud, the reality is that it usually lives on a server within a massive data center made up of many servers. Each server generally hosts multiple virtual machines that act as separate environments for individual accounts, allowing the provider to store your data in a way that keeps it segregated from other people’s…

Read More

Key Takeaways from Verizon’s 2015 Data Breach Report

By | Data Security, Enterprise Collaboration, Information Technology | No Comments

The 2015 Verizon Data Breach Investigations Report, published since 2008, was released last month, and it details a thorough investigation of common data security threat patterns, as well as the effects of different kinds of data breaches in various industries. Called “the Data Breach Bible” by Tripwire, the report compiled the data of nearly 80,000 security incidents and more than…

Read More
Sound exciting? Try Arc for free now! Get Started