September 15, 2012 Added by:Rafal Los
Any application that was built to be secured independently of the environment will do as well in a public cloud as it did in your private data center. If you build the application to be low-risk independent of your environmental controls you shouldn't have to worry where it lives...
September 12, 2012 Added by:Mike Gault
The security market in 2012 is estimated at $60 billion, yet adding more layers of perimeter security may be completely useless against a determined sysadmin working on the inside. The end result is that your data might or might not be secure – you simply have no way to prove it...
September 10, 2012 Added by:Bill Gerneglia
BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...
September 09, 2012 Added by:Ben Kepes
“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”
September 07, 2012 Added by:Ben Kepes
CIMI is arguably more complex than a simple standard – it reflects that people want to rubber stamp a standard, but also want to deliver proprietary functionality as a point of differentiation from the competition. CIMI is a positive initiative, but the proof is in the pudding...
August 30, 2012 Added by:Bozidar Spirovski
Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...
August 29, 2012 Added by:Ben Kepes
Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...
August 29, 2012 Added by:Barrie Hadfield
As the cloud wields increasing influence on corporate environments, the traditional ecosystem becomes more antiquated. There’s some paradox in how the cloud is enabling productivity and collaboration while simultaneously eroding security protocols designed to protect intellectual property and corporate assets...
August 25, 2012 Added by:Tripwire Inc
One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...
August 21, 2012 Added by:Barrie Hadfield
Consumer-based cloud platforms focus exclusively on usability and do little, if anything, to prevent the improper distribution of sensitive files and information across the firewall. the opportunity for corporate documents to fall into the wrong hands has become essentially limitless...
August 21, 2012 Added by:Ben Kepes
As far as I’m concerned, the future will see a gradual shift from on-premise, to private cloud, to public cloud – that’s a factor of economics and scale. But the bottom line is that cloud isn’t about meeting a series of technical check boxes; it’s about meeting the needs of the business...
August 15, 2012 Added by:Ben Kepes
At the end of the day, if is slightly cheaper to own your hardware than to rent, the fact is that if in doing so you have to spend time focusing on technology instead of focusing on your core business, then that savings pales into insignificance when compared to the real value that pure focus can bring...
August 08, 2012 Added by:Infosec Island Admin
As a result of the shift to the cloud, there's been an explosion of career opportunities. TECHEXPO Cloud East will host its inaugural hiring event for cloud computing professionals. Over 20 industry leaders will be on-site conducting face-to-face interviews for immediate career opportunities in the cloud...
August 06, 2012 Added by:Ben Kepes
For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...
July 31, 2012 Added by:Nicholas Cifranic
Android app stores such as Google Play have little or no security implementation, so anyone with a developer account may publish applications. Although Google has been attempting to enforce more controls to detect malicious apps, hackers are still publishing malware disguised as popular applications...
July 29, 2012 Added by:Ben Kepes
When faced by sometimes rabidly optimistic vendors that suggest putting everything into the cloud, right away, organizations are naturally a little confused when it comes to deciding what applications to move and how to develop an incremental migration strategy...
Bluetooth Security: Be Wary... 3re 4rwgf5 on 11-27-2014
Bluetooth Security: Be Wary... 3re 4rwgf5 on 11-27-2014
MS-ISAC Meeting Explores Advanced Persistent... Fagadha Vhsfhstjt on 11-27-2014