Blog Posts Tagged with "Data Center"
September 09, 2012 Added by:Ben Kepes
“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”
August 30, 2012 Added by:Bozidar Spirovski
Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...
August 29, 2012 Added by:Ben Kepes
Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...
August 15, 2012 Added by:Ben Kepes
At the end of the day, if is slightly cheaper to own your hardware than to rent, the fact is that if in doing so you have to spend time focusing on technology instead of focusing on your core business, then that savings pales into insignificance when compared to the real value that pure focus can bring...
August 06, 2012 Added by:Ben Kepes
For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...
July 12, 2012 Added by:Stefano Mele
The DOD has specific challenges that require careful adoption considerations, especially in areas of cybersecurity, continuity of operations, information assurance, and resilience. Additional challenges include service acquisition and funding, data migration and management, and overcoming network dependence...
July 11, 2012 Added by:Rafal Los
The challenges of dealing with a completely connected, ubiquitously computable world are that data can be moved, stored, and used anywhere and that the infrastructure that moves that data around is less and less under your control. That's an interesting thing for information security professionals...
July 08, 2012 Added by:Ben Kepes
Analysis of unstructured data is the hot topic these days – organizations are lured by the promise of deriving huge incremental value by gaining insights from crunching vast pools of seemingly random numbers to determine patterns and trends. It’s not a huge surprise that structured data analytics gets forgotten...
June 22, 2012 Added by:Headlines
The Federal government released The Digital Government Strategy, a 12-month action plan for the deployment of new technology is designed to enable the delivery of digital information and services anytime, anywhere, on any device, safely and securely-throughout the Federal workforce and to the American public...
May 15, 2012 Added by:Rafal Los
Portability is important not just across your various cloud providers but also internally. What are we talking about here? First is the acknowledgement that security isn't exclusively about the perimeter anymore. The move to cloud computing environments hastens this awareness...
May 12, 2012 Added by:Dan Dieterle
Many companies are turning to online services to help cut costs and restore some level of IT support to their organizations. But what truly makes you think that these online services are not going through the same internal cutbacks and employee changes to cut costs of their own?
May 09, 2012 Added by:Jayson Wylie
Cloud security threats can come from the lack of designed and implemented security by the provider. This may be intentional or not but the lack of oversight or negligence in this area can potentially cause disputes over the difference of control versus accountability...
April 25, 2012 Added by:Electronic Frontier Foundation
The government, which had originally seized files and still apparently holds all of Megaupload's financial assets, had argued that it had no obligation to make sure the files of innocent Megaupload users were returned and, in fact, believed that they could be destroyed...
April 09, 2012 Added by:Joe Weiss
I was asked by DOD how to get an organization to address OT security. The only chance for OT security to succeed is if senior management drives it. There are only a few utilities whose senior management mandated they be secure not just compliant. What a sorry commentary...
April 04, 2012 Added by:Fergal Glynn
Even as companies are adapting to this new paradigm, there are growing concerns about the safety of their data in the cloud. Incidents at cloud service providers like Dropbox highlight dangers of storing information in the cloud...
March 14, 2012 Added by:Rafal Los
Since everything I've been reading from the press, my colleagues, and analysts I know has been telling me security is ranked high in the top five concerns for cloud computing adoption - an article on ARN by Spandas Lui was like a bucket of ice water to the face...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013