Archives: News Articles

News Articles

Don’t recover from a disaster – prevent one

| August 27, 2013

Businesses understand the need to keep their cloud-based platforms running and available even in the event of a large-scale failure. Whether it’s an external attack or an internal datacenter or infrastructure issue, the right disaster prevention solution can mitigate downtime and provide critical services.

News Articles

How IP Reputation Filtering is Central to Your Security Success

Security Week | August 20, 2013

We’ve all heard the longstanding piece of advice to “nip it in the bud” when confronted with something unpleasant or avoidable. But sometimes, we forget to take this same advice when it comes to data security. Focusing early on the preventative side of security before reactive measures are needed is pivotal when it comes to […]

News Articles

The benefits of HITRUST certification

| August 02, 2013

As healthcare providers rely more and more on evolving technologies to store and transmit their data, compliance has become an increasingly complex landscape to navigate.

News Articles

FireHost Report Suggests Commodity Cloud Providers are Bolstering Botnet Agility

July 30, 2013

Q2 2013 sees sharp increase in blended, automated attacks BlackHat USA 2013, Las Vegas, NV – July 30, 2013 — Secure cloud hosting company, FireHost, has today announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks* that pose […]

News Articles

FireHost report shows cybercriminals are using the cloud to deploy attacks

| July 30, 2013

The report comes the same week of a report by the NASA Office of Inspector General which shows that NASA has overlooked critical security measures and procedures in its implementation of public cloud.  

News Articles

FireHost sounds alarm over cloud-dwelling cyber criminals

| July 30, 2013

A new report from secure cloud hosting vendor FireHost appears to show cyber criminals are turning to the cloud to increase the effectiveness of their attacks.  

News Articles

Apple overhauls developer site after breach

| July 24, 2013

Apple tells developers that an intruder attempted to take information from its software developer portal. But a researcher who claimed credit says he was merely reporting vulnerabilities.  

News Articles

A cloudy start for business promises a bright future

| July 11, 2013

A nebulous concept for some, the cloud is clearing away limitations for smaller businesses that need bigger computing power, as Charles Orton-Jones reports.  

News Articles

Security of Social Media: Preventing Simple Hacks that Carry a Huge Cost

Security Week | July 02, 2013

Social Media Accounts are Critical Access Points –  Treat Them as Such. When we talk about security, we often mention protecting social media accounts as a secondary measure to be handled after everything else is properly shielded. Social media, after all, seems trivial and inconsequential compared to protecting the infrastructure that houses your data.

News Articles

Zeta Compliance Technologies cuts cloud application response time by 750 percent with FireHost

July 02, 2013

Zeta’s customers benefit from enhanced cloud computing applications London – July 2, 2013 – FireHost, the secure cloud hosting company, has been hosting UK-based Zeta Compliance Technologies’ enterprise software as a service (SaaS) applications in FireHost’s secure cloud infrastructure since January 2013. Zeta Compliance Technologies, which is part of the Zeta Compliance Group PLC, chose […]