Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Cloud Security: The Need for Two-Factor Authentication in Cloud Computing
All Internet services that have personal or business information should offer strong 2-factor authentication

Think about all of the critical data and IT systems that are moving into the cloud these days. Consumer credit reporting, enterprise CRM and sales force automation, customer support systems, banking and stock trading, foreign exchange, DNS management, email security… the list goes on and on, and it is only going to accelerate. Imagine if any one of the above services that you or your company uses were accessed by a hacker or competitor.

Greg Conti, an Assistant Professor of Computer Science at the US Military Academy in West Point, gave a talk at Defcon last week about the dangers of cloud computing. “The information we are all giving to online companies is massive and dangerous and [security's] going to get worse before it gets better.” This has spurred renewed debate in the security industry about strong authentication on the Internet as more and more critical services move into the cloud.

One example was a blog posting of mine earlier this week where where Wells Fargo passwords for using a credit reporting server were somehow stolen, and identity thieves used those access codes to get onto the MicroBilt credit reporting site and mine the personal data, social security numbers, etc of over 7,000 people.

Had this cloud service required the use of authentication tokens or digital certificates in addition to a username and password, this type of breach would not have been possible.

Think about all of the critical data and IT systems that are moving into the cloud these days. Consumer credit reporting, enterprise CRM and sales force automation, customer support systems, banking and stock trading, foreign exchange, DNS management, email security… the list goes on and on, and it is only going to accelerate. Imagine if any one of the above services that you or your company uses were accessed by a hacker or competitor.

The Information Systems Audit and Control Association has released a statement that two-factor authentication systems connected to encrypted communications can secure Internet connections to cloud computing-based services.

“our belief is that, with the right technology, the new generation of cloud computing system can be made as secure — if not more secure — than existing server-based office systems” said Sarb Sembhi, president of the ISACA London Chapter.

My personal belief is that all Internet services that have personal or business information should offer strong 2-factor authentication to their users and customers.

 

About David Jevans
David Jevans is the Chief Executive Officer of IronKey, based in Los Altos, California. He is also the Chairman and Founder of the Anti-Phishing Working Group, the leading non-profit organization dedicated to eradicating identity theft and fraud on the Internet. The APWG has over 1,500 member companies and agencies worldwide. Membership is limited to banks and other financial institutions, ISPs, law enforcement agencies and security technology vendors.
Jevans has over 10 years of business experience in the Internet security industry, and has founded two high-tech startups, been through IPO, mergers and acquisitions.


In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Latest Cloud Developer Stories
The Transparent Cloud-computing Consortium (T-Cloud) is a neutral organization for researching new computing models and business opportunities in IoT era. In his session, Ikuo Nakagawa, Co-Founder and Board Member at Transparent Cloud Computing Consortium, will introduce the big ...
All in Mobile is a mobile app agency that helps enterprise companies and next generation startups build the future of digital. We offer mobile development and design for smartphones, tablets and wearables. Our projects cover the latest and most innovative technologies - voice ass...
NanoVMs is the only production ready unikernel infrastructure solution on the market today. Unikernels prevent server intrusions by isolating applications to one virtual machine with no users, no shells and no way to run other programs on them. Unikernels run faster and are light...
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lif...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
Most Read This Week
ADS BY GOOGLE