Items Tagged with "Cloud Security"


Rafal Los Tapped as HP's Cloud Security Strategist

September 29, 2011

Hewlett-Packard's Software division has tapped Infosec Island contributor Rafal Los for the position of Enterprise and Cloud Security Strategist. Los combines over a decade of deep technical expertise in information security and risk management with a critical business perspective...

Comments  (2)


Security: Tip Toeing Through the Clouds

September 28, 2011 Added by:Rafal Los

As elastic cloud computing becomes more popular, more critical applications and data will be living in those multi-tenant environments. While this is a fantastic development, security professionals can't let bad software development practices ruin the next biggest leap in business technology...

Comments  (0)


Cloud Computing Solutions in Federal Agencies part 3

September 27, 2011 Added by:Kevin L. Jackson

Security is an issue with client management interfaces with the public cloud provider. These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access...

Comments  (0)


What to Look for in Cloud Security

September 27, 2011 Added by:Robert Siciliano

Cloud-based data, just like local PC-based data, is vulnerable to physical theft if the building isn’t properly protected, power outages if there aren’t redundant power backups, natural disasters, and criminal hacking through system weaknesses, phishing, and social engineering...

Comments  (0)


Cloud versus Local Storage Security

September 22, 2011 Added by:Emmett Jorgensen

Each storage medium offers its own benefits for different scenarios. It's up to the user to choose the option that best fits. Security is a major difference in these two types of storage. Until cloud storage becomes more secure, many will prefer local storage alternatives...

Comments  (0)


Will Security Turn into a B2B Industry?

September 19, 2011 Added by:Danny Lieberman

As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...

Comments  (0)


NIST Releases Secure Cloud Computing Guidelines

September 15, 2011 Added by:Headlines

NIST is responsible for accelerating the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector and other stakeholders, including federal agencies...

Comments  (0)


SharePoint DLP: Don't Bring a Gun to a Knife Fight

September 13, 2011 Added by:Thomas Logan

SharePoint's collaborative capabilities mean sensitive information can easily be put at risk. CIOs need to come up with a solution to this content security challenge, while still allowing the positive business benefits of SharePoint's collaboration capabilities in your organization...

Comments  (0)


A Bunch of Virtual Machines Does Not a Cloud Make

September 09, 2011 Added by:Rafal Los

Allow me to interject some sanity here for a moment, because I seem to have stumbled upon a very interesting point which should be quite clear, but apparently is not. Just because you're running a bunch of virtual servers does not mean you're adopting cloud computing. Here's the situation...

Comments  (0)


Taming the Cloud - Provisioning and Security

September 08, 2011 Added by:Rafal Los

Whether deploying IaaS, PaaS, or SaaS, provisioning is the key to having a safe, secure, and stable environment. With the fragility and complexity of today's cloud deployments, you can't afford a single error which could unwind everything. I seem to recall this happening to a Cloud vendor recently...

Comments  (0)


Vivek Kundra Makes the Case for Government Cloud

September 01, 2011 Added by:Headlines

"...governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the 'I.T. cartel.' This powerful group of private contractors encourages reliance on inefficient software and hardware..."

Comments  (0)


Cloudpocalypse - When the Cloud Eats Your Corporate IP

August 30, 2011 Added by:Rafal Los

The Cloudpocalypse - where you've bought into a cloud service, neglected to understand what you're buying into (service level, liability, etc.) and then are left crying onto your keyboard as your cloud provider tells you, "Sorry, we've lost all your data... but you have a backup somewhere, right?"

Comments  (2)


And Now a Word from Your Commonsense

August 18, 2011 Added by:Mike Meikle

As infosec pros debate the finer points of IPv6, cloud security, it behooves us to stop and remember our customers. They don’t care if your solution is FIPS certified and is SAS 70 compliant. They are only concerned if their identity is stolen and used to open a pickle stand in Zanzibar...

Comments  (0)


Seven Areas of Concern With Cloud Security

August 18, 2011 Added by:Brent Huston

Opportunities abound for those who desire to guide cloud computing. Those concerned with keeping cloud computing an open system drafted an Open Cloud Manifesto, asking that a straightforward conversation needs to occur in order to avoid potential pitfalls...

Comments  (0)


Software Security for the Cloud - Same Pig, Shiny Lipstick

August 03, 2011 Added by:Rafal Los

The bottom line here is this - migrating to a cloud architecture doesn't magically make your applications secure... although for many SMBs this is a better option than trying to tackle this problem alone. Let's talk this through...

Comments  (0)


Data Thefts Surge Despite Increased Budgets

July 28, 2011 Added by:Headlines

"We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it a challenge for IT security teams to protect corporate data. Organizations must be able to proactively identify and mitigate security threats in real time..."

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »