Blog Posts Tagged with "Cloud Security"

4c1c5119b03285e3f64bd83a8f9dfeec

Keeping Safe In The Cloud

September 09, 2012 Added by:Ben Kepes

“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Google Wallet: Please Tell Me They’re Joking...

September 08, 2012 Added by:Joel Harding

No computer in the world is safe from a determined hacker. Most of us don’t properly secure our computer, our smart phone, or even our wallets. So how in the heck does storing your credit and debit card information “in the cloud” help you secure your already vulnerable information?

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

DMTF's Cloud Infrastructure Standard

September 07, 2012 Added by:Ben Kepes

CIMI is arguably more complex than a simple standard – it reflects that people want to rubber stamp a standard, but also want to deliver proprietary functionality as a point of differentiation from the competition. CIMI is a positive initiative, but the proof is in the pudding...

Comments  (0)

E973b16363b3de77b360563237df7e32

Steps to Ensure a Smooth(er) Migration to a Cloud Service

August 30, 2012 Added by:Bozidar Spirovski

Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Cloud Outages (Yeah, They Happen)

August 29, 2012 Added by:Ben Kepes

Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

How the Cloud Disrupted the Corporate Ecosystem

August 29, 2012 Added by:Barrie Hadfield

As the cloud wields increasing influence on corporate environments, the traditional ecosystem becomes more antiquated. There’s some paradox in how the cloud is enabling productivity and collaboration while simultaneously eroding security protocols designed to protect intellectual property and corporate assets...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Mobile Infrastructure: The Elephant in the Data Center

August 25, 2012 Added by:Tripwire Inc

One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...

Comments  (2)

C67c179cd59e50f867e06086f5b2d21f

The Unforeseen Risks of the Cloud

August 21, 2012 Added by:Barrie Hadfield

Consumer-based cloud platforms focus exclusively on usability and do little, if anything, to prevent the improper distribution of sensitive files and information across the firewall. the opportunity for corporate documents to fall into the wrong hands has become essentially limitless...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

The Cloud: It’s About Flexibility

August 21, 2012 Added by:Ben Kepes

As far as I’m concerned, the future will see a gradual shift from on-premise, to private cloud, to public cloud – that’s a factor of economics and scale. But the bottom line is that cloud isn’t about meeting a series of technical check boxes; it’s about meeting the needs of the business...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Network Exposure and Healthcare Privacy Breaches

August 20, 2012 Added by:Danny Lieberman

EHR interconnected with HIE systems have a big threat surface, because of big, very complex software systems with a large number of attacker entry points. Healthcare system vulnerabilities are compounded since everyone is using the same technology from Microsoft and following the same HIPAA compliance checklists...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

The Future Ain’t Homogenized: Please Stop the FUD Vendors

August 15, 2012 Added by:Ben Kepes

At the end of the day, if is slightly cheaper to own your hardware than to rent, the fact is that if in doing so you have to spend time focusing on technology instead of focusing on your core business, then that savings pales into insignificance when compared to the real value that pure focus can bring...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Don't Miss the TECHEXPO Cloud Computing Hiring Event

August 08, 2012 Added by:Infosec Island Admin

As a result of the shift to the cloud, there's been an explosion of career opportunities. TECHEXPO Cloud East will host its inaugural hiring event for cloud computing professionals. Over 20 industry leaders will be on-site conducting face-to-face interviews for immediate career opportunities in the cloud...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Dropbox Security Issues: IT Has Only Itself to Blame

August 06, 2012 Added by:Ben Kepes

For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Technical Considerations when Moving to the Cloud

July 29, 2012 Added by:Ben Kepes

When faced by sometimes rabidly optimistic vendors that suggest putting everything into the cloud, right away, organizations are naturally a little confused when it comes to deciding what applications to move and how to develop an incremental migration strategy...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Between You and Me, This is Not Private...

July 22, 2012 Added by:Fergal Glynn

If most websites can’t get password storage right, you can bet they can’t get storage of the content you are trusting them with right either. The private documents that you stored with your favorite cloud service are probably not encrypted in a way that only your account can decrypt, if they’re encrypted at all...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Security Mistakes You Will Make on Your Next Cloud Project

July 18, 2012 Added by:Danny Lieberman

The Cloud Security Control model looks great, but it doesn’t mitigate core vulnerabilities in your software. Once you choose the right service model and vendor, put aside the security reference models and focus on hardening your application software. It’s your code that will be running in someone else's cloud...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »