Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Snowden Effect: Who Controls My Data?
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/22/2014 | 1:59:34 AM
Snowden always tried to use proxy servers and VPNs to hide identity and then finally it happen so not new.
Brad Garlinghouse
Brad Garlinghouse,
User Rank: Apprentice
2/26/2014 | 2:32:12 PM
Re: Cloud to On-Premise
We've reached the point where "secure" and "user-friendly" can no longer be mutually exclusive concepts. People are so used to intuitive experiences, professional services that emphasize control have to fit this trend otherwise users will drift back to less secure consumer products.
Brad Garlinghouse
Brad Garlinghouse,
User Rank: Apprentice
2/26/2014 | 2:31:33 PM
Re: New Times Need New Rules
Facebook is a good example of a service learning that its users want more control over how their information is being used. It's not perfect yet, but it definitely feels like its privacy settings are less opaque than they used to be.
User Rank: Apprentice
2/19/2014 | 9:46:32 AM
Re: New Times Need New Rules
After whistle-blowing NSA's notorious tracking program 'PRISM' since June last year, Snowden is reported to be hiding in a Russian lam. Snowden was very much found to be using online masks like proxy servers and VPNs to hide his true location and identity...
User Rank: Apprentice
2/18/2014 | 9:28:46 PM
Re: Cloud to On-Premise

That's a great question.  Our on-premise solution was built on the same technology and uses the same web interface as our cloud based offering.   In addition, we packaged the desktop sync, Outlook plugin, FTP, and mobile access in to insure the product is complete. 

Because we started as a cloud service, our appliance has additional security features baked in, including multiple firewalls, monitoring, and encryption.  Then by allowing the IT person to physically put the product behind their firewall, and integrate AD/LDAP it gives them even greater control.  Here is a few screenshots of the product:  https://www.smartfile.com/business/
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
2/18/2014 | 4:27:40 PM
Re: Cloud to On-Premise
I'm glad to hear that at least two fire-sharing executives are responding to customers demands for greater control and transparency in the wake of the Snowden Effect. I'm curious about how user-friendly this "second wave" really is. And if it's too "friendly", how secure? 
User Rank: Apprentice
2/15/2014 | 7:50:22 PM
Cloud to On-Premise

I am the CEO of a file sharing company that recently just released an on-premise product to combat this vary issue. The market reception has been overwhelming and primarily in the EU.  Their data security and privacy laws far exceed ours, and this "Snowden Effect" has pushed their data concerns to the forefront.  

Businesses often talk about security threats as outside concerns, but as you pointed out the security concern needs to be directed at the people sitting behind the firewall.  I recently wrote a blog about this very topic, entitled, "Does Edward Snowden Work for You".  I only mention this because I think it supports your article by bringing internal security to the forefront.  https://www.smartfile.com/blog/does-edward-snowden-work-for-your-company/ This IS and WILL have an ever lasting effect, not just to national security, but to all businesses. 
User Rank: Apprentice
2/14/2014 | 1:57:43 PM
Re: New Times Need New Rules
I think that it is just really important to give control over to the user. The Flipboard example is prescient. Instead of covertly using data to customize things, allow people to do it overtly.

Many of the biggest technology companies are catching on to this. Facebook, for example, has learned the hard way by contstantly iterating, adding and removing features based on real-time feedback.
User Rank: Apprentice
2/14/2014 | 12:40:27 PM
New Times Need New Rules
I'm frustrated by the executive and judicial branches assumption that once your information has left one's personal or corporate physical property, that the "right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" ends.

The corporate attorneys and electronic freedom attorneys need to work with the federal juciciary to come up with language for online providers that allows citizens and corporations to have the same security in "their persons, houses, papers, and effects, against unreasonable searches and seizures" when the stuff is in the cloud as when it is on their physical property.

This is equally important for upholding the spirit of the US Constitution for the people as it is for keepling cloud services as a viable business model.


I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file