Blog Posts Tagged with "Cloud Computing"

4c1c5119b03285e3f64bd83a8f9dfeec

The True State of Next-Generation Data Centers

February 12, 2011 Added by:Ben Kepes

As the cloud computing trends continue to inundate the IT market, organizations must seek ways to ensure capacity required to run business critical applications. During the shift to the cloud, capacity must be available and current infrastructure needs to maintain a strong hold on efficiency...

Comments  (0)

F520f65cba281c31e29c857faa651872

How the Cloud Can Lock You In

February 05, 2011 Added by:Rahul Neel Mani

Organizations look at it as I have to protect my data either for importance or compliance reasons, maintain it and have it totally secure. Whether it be the aspect of authorization, authentication, or encryption of the data, information management security becomes a key component...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance News and Upcoming Events

February 02, 2011 Added by:Marjorie Morgan

Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...

Comments  (0)

F520f65cba281c31e29c857faa651872

High-Performance Computing in the Enterprise

January 29, 2011 Added by:Rahul Neel Mani

Eng Lin Goh, CTO, SGI in a conversation with Geetaj Channana on the evolution of the company after its takeover by Rackable, and their contribution to cloud computing and high-performance computing in the enterprise...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Global GovCloud and the Virtual Environment

January 27, 2011 Added by:Kevin L. Jackson

Recently I had the awesome experience of participating in a global tele-presence conference on government cloud computing. A key takeaway for me was that pre-integrated cloud infrastructure solutions have been credited with reducing the non-recurring engineering cost of private clouds...

Comments  (0)

F520f65cba281c31e29c857faa651872

The Public Cloud versus the Private Cloud

January 21, 2011 Added by:Rahul Neel Mani

Peter Coffee, Head of Platform Research for Salesforce.com discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...

Comments  (0)

23ce88322d3298cbfac813448612a1c9

More than 88 Lines About Less than 44 Weeks in Infosec

January 21, 2011 Added by:Mark Evertz

It's a never ending journey that unearths painful truths, nerve-wracking challenges to your beliefs and confidence, and it keeps it's clutches in you with the lure of fighting the good fight or making an obscene amount of money and wreaking havoc on the world if you're donning the black hat...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Credit Card Security in the Cloud

January 21, 2011 Added by:Danny Lieberman

Obviously, the standard was written by system administrators and not programmers because the notion of inter-process communications is ignored. Once we are running online transaction applications in the cloud, the notion of public networks becomes an antiquated given...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Bohu Trojan is Designed to Disable Cloud Antivirus

January 20, 2011 Added by:Headlines

The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Securing Web Services in the Cloud

January 19, 2011 Added by:Danny Lieberman

Access to confidential information or embezzlement of funds is just some of the possible internal security breaches that can be performed by employees or former employees. Because employees are the most familiar with internal systems, detection can be made extremely difficult...

Comments  (3)

10e258c8d23d441b915c1b2333b6996a

Enterprise Privacy and Infosec (HIPAA-HITECH)

January 16, 2011 Added by:Jack Anderson

A task based methodology is key to providing a step by step process ensuring a complete and comprehensive programs is established. Metrics for measuring performance allow both internal monitoring of progress as well as the ability to demonstrate compliance levels to business partners...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Why Rich Web 2.0 May Break the Cloud

January 12, 2011 Added by:Danny Lieberman

In the Cloud of rich Web 2.0 application services, we are not in Kansas anymore. There is a very very good reason to be worried. With all the expertise of cloud security providers – the Web 2.0 service they provide is only as secure as the application software itself...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

NIST Launches Cloud Computing Collaboration Twiki

January 10, 2011 Added by:Kevin L. Jackson

The National Institute of Standards and Technology (NIST) has been designated by Federal Chief Information Officer Vivek Kundra to accelerate the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines..

Comments  (1)

A08e32d2f9a8b78894d964ec7fd4172e

Realizing the Potential of Virtualization

January 06, 2011 Added by:Stefan Fouant

In order for the vision of virtualization to realize it's true potential, the physical mold we have become accustomed to will have to be broken. Resources will need to be pooled together and this just isn't effective or scalable within the confines of traditional server chassis as we know it today...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GovCloud Predictions for 2011

January 02, 2011 Added by:Kevin L. Jackson

2011 will be the breakout year for GovCloud. Pressure to reduce budget, pressure to manage resources better, and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Strategies For The Efficient CISO

December 28, 2010 Added by:Sasha Nunke

This new model will ultimately make security easier and more embedded into the architecture of cloud services, while allowing CISOs to select the best cloud providers and SaaS applications to keep their data secure and systems operating more cost effectively and efficiently within regulatory compliance...

Comments  (3)

Page « < 9 - 10 - 11 - 12 - 13 > »