Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Snowden Effect: Who Controls My Data?
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/22/2014 | 1:59:34 AM
Snowden always tried to use proxy servers and VPNs to hide identity and then finally it happen so not new.
Brad Garlinghouse
Brad Garlinghouse,
User Rank: Apprentice
2/26/2014 | 2:32:12 PM
Re: Cloud to On-Premise
We've reached the point where "secure" and "user-friendly" can no longer be mutually exclusive concepts. People are so used to intuitive experiences, professional services that emphasize control have to fit this trend otherwise users will drift back to less secure consumer products.
Brad Garlinghouse
Brad Garlinghouse,
User Rank: Apprentice
2/26/2014 | 2:31:33 PM
Re: New Times Need New Rules
Facebook is a good example of a service learning that its users want more control over how their information is being used. It's not perfect yet, but it definitely feels like its privacy settings are less opaque than they used to be.
User Rank: Apprentice
2/19/2014 | 9:46:32 AM
Re: New Times Need New Rules
After whistle-blowing NSA's notorious tracking program 'PRISM' since June last year, Snowden is reported to be hiding in a Russian lam. Snowden was very much found to be using online masks like proxy servers and VPNs to hide his true location and identity...
User Rank: Apprentice
2/18/2014 | 9:28:46 PM
Re: Cloud to On-Premise

That's a great question.  Our on-premise solution was built on the same technology and uses the same web interface as our cloud based offering.   In addition, we packaged the desktop sync, Outlook plugin, FTP, and mobile access in to insure the product is complete. 

Because we started as a cloud service, our appliance has additional security features baked in, including multiple firewalls, monitoring, and encryption.  Then by allowing the IT person to physically put the product behind their firewall, and integrate AD/LDAP it gives them even greater control.  Here is a few screenshots of the product:  https://www.smartfile.com/business/
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
2/18/2014 | 4:27:40 PM
Re: Cloud to On-Premise
I'm glad to hear that at least two fire-sharing executives are responding to customers demands for greater control and transparency in the wake of the Snowden Effect. I'm curious about how user-friendly this "second wave" really is. And if it's too "friendly", how secure? 
User Rank: Apprentice
2/15/2014 | 7:50:22 PM
Cloud to On-Premise

I am the CEO of a file sharing company that recently just released an on-premise product to combat this vary issue. The market reception has been overwhelming and primarily in the EU.  Their data security and privacy laws far exceed ours, and this "Snowden Effect" has pushed their data concerns to the forefront.  

Businesses often talk about security threats as outside concerns, but as you pointed out the security concern needs to be directed at the people sitting behind the firewall.  I recently wrote a blog about this very topic, entitled, "Does Edward Snowden Work for You".  I only mention this because I think it supports your article by bringing internal security to the forefront.  https://www.smartfile.com/blog/does-edward-snowden-work-for-your-company/ This IS and WILL have an ever lasting effect, not just to national security, but to all businesses. 
User Rank: Apprentice
2/14/2014 | 1:57:43 PM
Re: New Times Need New Rules
I think that it is just really important to give control over to the user. The Flipboard example is prescient. Instead of covertly using data to customize things, allow people to do it overtly.

Many of the biggest technology companies are catching on to this. Facebook, for example, has learned the hard way by contstantly iterating, adding and removing features based on real-time feedback.
User Rank: Apprentice
2/14/2014 | 12:40:27 PM
New Times Need New Rules
I'm frustrated by the executive and judicial branches assumption that once your information has left one's personal or corporate physical property, that the "right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" ends.

The corporate attorneys and electronic freedom attorneys need to work with the federal juciciary to come up with language for online providers that allows citizens and corporations to have the same security in "their persons, houses, papers, and effects, against unreasonable searches and seizures" when the stuff is in the cloud as when it is on their physical property.

This is equally important for upholding the spirit of the US Constitution for the people as it is for keepling cloud services as a viable business model.


I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-06-28
Marval MSM v14.19.0.12476 has an Improper Access Control vulnerability which allows a low privilege user to delete other users API Keys including high privilege and the Administrator users API Keys.
PUBLISHED: 2022-06-28
Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.
PUBLISHED: 2022-06-28
File inclusion vulnerability in Minicms v1.9 allows remote attackers to execute arbitary PHP code via post-edit.php.
PUBLISHED: 2022-06-28
A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter.
PUBLISHED: 2022-06-28
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.