Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Stackify Blog, Andreas Grabner

Related Topics: @CloudExpo, Agile Computing, Release Management

@CloudExpo: Blog Post

Life After WikiLeaks – Exposure Is Still a Threat

Is WikiLeaks Dead?

If nothing else, Julian Assange was an Internet pioneer for exposing things that otherwise would not have seen the light of day on such a large scale. There have been whistle-blowers and various documents made available to the press and courts in years past, but nothing on the scale and public availability of what WikiLeaks provided. Like opening a can of worms, the potential for copycat sites and rogue insiders trying to make money from stealing internal documents is now unfortunately a lurking reality. A leak of memos and internal reports on such a widespread public forum could be a crippling risk to any corporation if they were the next big leak.

Many of these leaks, like the one announced yesterday involving US Navy intelligence specialist Brian Minkyu Martin, are inside jobs and potentially the hardest to stop. For these, a combination of a “bullet-proof” security policy and a lockdown of anything that looks like a storage device plugged into a USB port could potentially stop many of the amateurs.

However, far more sophisticated cyber criminals are sniffing out electronic transfers without detection for the thousands of files transferred among businesses every day. Surprisingly, many companies are not taking the simple steps to verify that their data and other confidential communications is encrypted – until it is too late.

The question begs, how do we keep ourselves from being the next headline on a site like WikiLeaks? The answers are simple. Centralize your data management, limit access to only the individuals with a constant expressed “need-to-know,” and only transfer information securely whether external or even internally within your company.

One of the better secure file server tools on the market right now is GoAnywhere Services by Linoma Software. I’ve been able to test it on Windows, Linux, Unix (in a VMware environment), and even on an IBM iSeries. Not only was it fast and browser-based, but it provided many levels of role-based and credential-based access for users. The application also provided IP filtering and various triggers that alerted me to file movement and internal or external user activity. The secure file server can also be paired with a reverse proxy DMZ gateway and a managed file transfer application. I tried the managed file transfer application called GoAnywhere Director and was surprised how easy it was to automate, audit and centralize all the data transformation and transfer tasks I needed to do that day.

The notion I’ve been promoting in offices for years is that every file matters. Because of that belief, you need to develop a culture of data security where it is easy and almost fun to exchange information securely (Comrade, have you the microfilm?). Do not put yourself at risk for supplying a WikiLeaks site with their next headline. Remember that there is no compensation for unknowingly providing unsecure information to the masses. Thread an easy-to-use and effective secure file transfer system into the fabric of your data security plan today.

More Stories By Dirk Zwart

Born in Canada and calling Nebraska home, Dirk primarily writes on the Technical side of the IT realm. Having written for years at Gateway Computer and as part of other large IT organizations, Dirk happily writes for Linoma Software. When not writing children's stories or stage scripts, you'll find Dirk out back in the vegetable garden or building yet another server for reasons unknown. Follow Dirk on Twitter, Facebook, or LinkedIn.

Microservices Articles
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will discuss how to use Kubernetes to setup a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace....
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...