Cloud Security

34aa54ea9abbb1073d2ff4a687f72243

Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)

F520f65cba281c31e29c857faa651872

Infrastructure will Determine Future of Cloud Computing

May 21, 2010 Added by:Rahul Neel Mani

Rolf Kleinwächter, Head of Managed Office and Infrastructure-as-a-Service, Fujitsu, agrees that it is still the early days of cloud computing, but says his company is prepared to cash in on the new developments...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Security Compliance in a Cloud

April 19, 2010 Added by:Mark Gardner

For this inaugural post I have decided to tackle, what I perceive to be one of the biggest conundrums within the growth area of Cloud Computing, Security Compliance. I use the term conundrum, not that I believe for one second that Cloud Computing does not need Security and some form of compliance, far from it, but that suddenly these seem to have become show stopping issues for the uptake...

Comments  (6)

65be44ae7088566069cc3bef454174a7

Privacy and Cloud Computing Challenges

April 16, 2010 Added by:Rebecca Herold

The concept of “cloud computing” is not well known by most folks. Certainly not the personnel using a vast and growing number of cloud computing applications, without even know it, from business networks. If they don’t know what they are using, then how can they know the information security and privacy risks involved?

Comments  (0)

F520f65cba281c31e29c857faa651872

Chris Powers: HP's Worldwide Director of Enterprise Storage

April 13, 2010 Added by:Rahul Neel Mani

Chris Powers, Worldwide Director, Enterprise Storage, HP StorageWorks Division spoke to Rahul Neel Mani about HP’s latest push – ‘Storage and Server Convergence’ – as well as other technologies that will excite enterprise users in 2010-11.

Comments  (0)

924ce315203c17e05d9e04b59648a942

2010: A Year of Change for the Security Industry

April 04, 2010 Added by:Richard Stiennon

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is Security a Curse for the Cloud Computing Industry?

March 25, 2010 Added by:Richard Stiennon

In 1975 my father, a doctor, was approached by some entrepreneurs. They had a brilliant idea. They were going to purchase a mainframe computer and sell computing on a timeshare basis to anyone who wanted to connect to it.  Charges would be based on compute cycles and applications would be provided pre-loaded.  Sound familiar?  That was cloud computing.   Today’s clou...

Comments  (3)

B59a51a3c0bf9c5228fde841714f523a

How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Cloud computing: A Maneuvered Phrase !

February 11, 2010 Added by:K S Abhiraj

Cloud computing has become a huge ‘buzz-phrase’ in last few years, but you’d be forgiven for not knowing what the term actually means indeed. Different people interpret “cloud computing” in different ways. That’s the dilemma because computing “in the cloud” may be important for you and your organization, but if it’s not clear what it actually m...

Comments  (2)

426c2c140d842b9f9c538b204ff83a6d

Eating your own dog food - how a Security Software company uses Security

February 04, 2010 Added by:Larry Ketchersid

Remember the gentleman in the commercial for Hair Club for men who said “I'm not only the President, but I'm a customer”? While there are days when the hair club tempts me, it is security solutions that my company, Media Sourcery, provides. And, like many of Infosec Island's members, the information, data and documents that we exchange with our customers are proprietary, confidential a...

Comments  (1)

F0a7d979c6e57d746e1164ed6e44678e

Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?

January 21, 2010 Added by:Brent Carey

Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not   the most serious data privacy breach in a search engine’s histo...

Comments  (1)

634ff692af43fd4dc5dab3b8590c77d6

Virtualization : the maneuver tactic !

December 17, 2009 Added by:K S Abhiraj

The lure of virtualization is clear. From the business perspective, it means faster time-to-market for new technology enabled services and a strong foundation for new strategic initiatives, such as cloud computing. For technology organizations, virtualization promises faster server provisioning, increased hardware utilization, and lower costs for disaster recovery (DR).

Comments  (0)

B32b392ce3a707f05f4838c48c67d9cf

Should SSL be enabled on every website?

October 14, 2009 Added by:Christopher Hudel

Using SSL to secure all websites may seem like an odd choice; most websites contain no "nuggets" worth taking, SSL apparently slows the page load time (especially on over provisioned hosting platforms), and it's not clear if doing so will kibosh any search engine optimizations. 

Comments  (10)

Abceedf5017915685f379075f00a5ccd

My Mind is Wave-ering on the Utility, Security and Privacy Aspects

October 14, 2009 Added by:Sudha Nagaraj

Like many other Wave-wannabes, I am also awaiting an invite from Google to try out their all-in-one communication solution Google Wave. But I have my trepidations: over making my private work public, over opening up for comment work that is still being worked out, over messing up “my thoughts” with a thousand other theories, over starting something with the full knowledge that it could...

Comments  (0)

Abceedf5017915685f379075f00a5ccd

Squinting at Cloud Formations

October 12, 2009 Added by:Sudha Nagaraj

The problem with the cloud is that it can evaporate leaving no trace behind! The weekend thunderbolt that hit over a million subscribers of T-Mobile Sidekick, operated by the Microsoft subsidiary, Danger Inc in the US, is standing testimony to the whimsical nature of cloud computing.

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »