November 06, 2012 Added by:Ben Kepes
As we move to broader scale cloud adoption, one would be excused for assuming that we’d reached a point where the definition of what constitutes IaaS is set in stone – true different vendors package up their virtual servers with different specs, but IaaS is, to a greater or lesser extent, a fixed concept...
October 29, 2012 Added by:Tripwire Inc
Cloud computing has increased productivity and decreased IT costs. However, there is a black lining to this particular cloud, as the benefits come at the price of giving up control, visibility and tracking data provenance...
October 28, 2012 Added by:Bill Gerneglia
If you are the CIO of your organization and you spent the last decade locking down your data center hardware, patching your OSs, developing a disaster recovery plan, and securing your applications are you really in a rush to move the operation and applications to the cloud?
October 02, 2012 Added by:Victor Cruz
It has been 12 years since the US passed a law to facilitate the use of electronic records and electronic signatures. Called the Electronic Signatures in Global and National Commerce Act (ESIGN), its general intent in black and white is quoted in the very first section of the legislation...
September 26, 2012 Added by:Ben Kepes
The decision was made during the consultation process that universal design and accessibility issues should be outside the scope of the document. That was a necessary decision as the drive was to come up with a readily consumable document that vendors could easily comply with...
September 17, 2012 Added by:Ben Kepes
"The advent of cloud computing has removed infrastructure as a barrier to rapid and massive scaling of applications. [IaaS and Paas have] made it possible for a developer to create an application one day and have it utilized by hundreds of thousands of users the next..."
September 16, 2012 Added by:Bill Gerneglia
The face of corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – the fact is that in the long run individual organizations will not have email server administrators, desktop software support personnel or systems administrators...
September 15, 2012 Added by:Rafal Los
Any application that was built to be secured independently of the environment will do as well in a public cloud as it did in your private data center. If you build the application to be low-risk independent of your environmental controls you shouldn't have to worry where it lives...
September 12, 2012 Added by:Mike Gault
The security market in 2012 is estimated at $60 billion, yet adding more layers of perimeter security may be completely useless against a determined sysadmin working on the inside. The end result is that your data might or might not be secure – you simply have no way to prove it...
September 10, 2012 Added by:Bill Gerneglia
BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...
September 09, 2012 Added by:Ben Kepes
“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”
September 07, 2012 Added by:Ben Kepes
CIMI is arguably more complex than a simple standard – it reflects that people want to rubber stamp a standard, but also want to deliver proprietary functionality as a point of differentiation from the competition. CIMI is a positive initiative, but the proof is in the pudding...
August 30, 2012 Added by:Bozidar Spirovski
Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...
August 29, 2012 Added by:Ben Kepes
Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...
August 29, 2012 Added by:Barrie Hadfield
As the cloud wields increasing influence on corporate environments, the traditional ecosystem becomes more antiquated. There’s some paradox in how the cloud is enabling productivity and collaboration while simultaneously eroding security protocols designed to protect intellectual property and corporate assets...
August 25, 2012 Added by:Tripwire Inc
One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...
Freedom versus Security... Jack Smith on 04-20-2014
Protecting Our Data... Jack Smith on 04-20-2014
Tackling Modern Malware... Jack Smith on 04-20-2014