Items Tagged with "Cloud Security"


7fef78c47060974e0b8392e305f0daf0

NIST: Cloud Computing Synopsis and Recommendations

June 05, 2012

This document reprises the definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the opportunities and risks of cloud computing...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Megaupload User Asks Court for Their Files Back... Again

June 01, 2012 Added by:Electronic Frontier Foundation

EFF’s asked the court to return files lost when Megaupload was seized last January. Since then, we’ve been to court both for a hearing and a mediation and nothing has changed. The key problem: the government has failed to help third parties get access to their data. So we have no choice but to go back to court...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cloud Patch Management: Consistency and Automation

May 23, 2012 Added by:Rafal Los

If you've chosen wisely, you environments across your public and private clouds are consistent. The big question is - how do we keep our environments consistent in the face of security requirements to push patches? The answers rely very heavily on automation and policy...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Big Opportunities in the Cloud

May 16, 2012 Added by:Ben Kepes

Purists were adamant that the Private Cloud was flawed and that it could not deliver the benefits of the Public Cloud. On the other hand organizations were highly skeptical of the Public Cloud, listing its shortcomings in terms of security, reliability, compliance and control...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Where Will the Buck Stop in Cloud Security?

May 15, 2012 Added by:Jayson Wylie

I don’t want to see the main outcome of security and data breaches become lengthy litigation. If cloud security boils down to he who has the best law team, the direction of security will have an approach of least exposure to litigation versus Cyber threats. This does not settle with me as a valid security driver for improving security posture...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Portability of Security in Cloud Computing

May 15, 2012 Added by:Rafal Los

Portability is important not just across your various cloud providers but also internally. What are we talking about here? First is the acknowledgement that security isn't exclusively about the perimeter anymore. The move to cloud computing environments hastens this awareness...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

The Absurdity of Cloud Computing and Hosted Services

May 12, 2012 Added by:Dan Dieterle

Many companies are turning to online services to help cut costs and restore some level of IT support to their organizations. But what truly makes you think that these online services are not going through the same internal cutbacks and employee changes to cut costs of their own?

Comments  (7)

0a8cae998f9c51e3b3c0ccbaddf521aa

Keeping Security Relevant: From Control to Governance in the Cloud

May 11, 2012 Added by:Rafal Los

When someone mentions public cloud, you quickly see the polarizing effects the topic has, generating a very negative reaction to the idea of putting anything corporate in the public cloud. What does that mean for the future of corporate information security and risk management?

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

FedRAMP Releases Updated Security Assessment Templates

May 11, 2012 Added by:Kevin L. Jackson

FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and monitoring for Cloud Service Providers. This document has been designed for Third-Party Independent Assessors to use for planning security testing of CSPs...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Is Cloud Security in the Clouds?

May 09, 2012 Added by:Jayson Wylie

Cloud security threats can come from the lack of designed and implemented security by the provider. This may be intentional or not but the lack of oversight or negligence in this area can potentially cause disputes over the difference of control versus accountability...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Making the Security Case

May 05, 2012 Added by:Rafal Los

When we think about cloud computing we can think of security as getting a bit of a gentle push, or shove in some cases. The way it is built and billed as services instead of individual components, and the increased emphasis on automation - security has a real chance of not being a roadblock...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber Weapons - Bits Instead of Bullets Damage Nonetheless

May 03, 2012 Added by:Rafal Los

In this post I discuss some of the ramifications of digital weapons and put into context just what this means for your enterprise security strategy as your organization continues towards cloud/utility computing, mobility, and a larger presence on the Internet...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Five Conversations that will Shape Your Cloud Security Model

May 03, 2012 Added by:Rafal Los

We need to move away from the control model into a governance model and acknowledge we're not going to have control over all of our risk. Any notion that you have control is a delusion. Assuming that if you control the environment you have better security is a fallacy...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

More on Banking 2.0 - Who Ya Gonna Trust?

May 01, 2012 Added by:Ben Kepes

Banks sit on a far higher level of the trust spectrum than do companies like Google and Apple – at least in consumers minds. A study commissioned in 2010 that found that telecoms were seen as the second most trusted group, after banks, for securing personal information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Google as a Cyber Weapon: New Attack Method Discovered

April 30, 2012 Added by:Pierluigi Paganini

The lesson learned is that it is possible to use Google as a cyber weapon to lauch a powerful "Denial of Money" attack against other platforms. In reality, the service in this case hasn't been interrupted, but the attack has made it extremely expensive to run...

Comments  (0)

94c7ac665bbf77879483b04272744424

Outsourcing SIEM and Log Analysis

April 29, 2012 Added by:Marc Quibell

What are the risks of MSSPs managing the detection and analysis of network activity data for your company? There are some events that, if detected early, may avert lawsuits, data breaches and other embarrassing or career-ending moments for a company...

Comments  (4)

Page « < 3 - 4 - 5 - 6 - 7 > »