Items Tagged with "Cloud Security"


Ebe141392ea3ebf96ba918c780ea1ebe

Going Back to the Stack

March 15, 2012 Added by:Wendy Nather

If you have parts of your infrastructure outsourced, go over your contracts with your providers. You want them to be able to give you logs within a few minutes of the request and have the right technical support without fighting your way through first-level script-readers...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Understanding Cloud Security Part Two

March 14, 2012 Added by:Neira Jones

Organisations need to ask cloud providers to disclose security controls and how they are implemented, and consuming organisations need to know which controls are needed to maintain the security of their information. Lack of thoroughness can lead to detrimental outcomes...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud - What's the Deal with Cloud Security?

March 14, 2012 Added by:Rafal Los

Since everything I've been reading from the press, my colleagues, and analysts I know has been telling me security is ranked high in the top five concerns for cloud computing adoption - an article on ARN by Spandas Lui was like a bucket of ice water to the face...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

INSA Report: Cloud Computing for the Intelligence Community

March 13, 2012

The INSA white paper provides critical analysis of current cloud computing adoption best practices, and discusses potential cost savings, likely impacts on government organizational culture, potential deployment models and necessary security measures...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Understanding Cloud Security Part One

March 11, 2012 Added by:Neira Jones

The cloud provides an opportunity to re-architect older applications and infrastructure to meet or exceed modern security requirements. At other times, the risk of moving sensitive data and applications to an emerging infrastructure might exceed tolerance levels...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NIST Draft Addresses Security Threats and Privacy Controls

March 07, 2012 Added by:David Navetta

NIST notes that many of the changes were driven by particular security issues and challenges requiring greater attention including, insider threats, mobile and cloud computing, application security, firmware integrity, supply chain risk, and advanced persistent threats...

Comments  (0)

59da131e1207b6fadf8fec3862d85ad1

Cloud Security Report: The Cloud May Be Safer

March 05, 2012 Added by:alan shimel

This first installment of what promises to be a semi-annual report sheds some real light on the differences between on premises and cloud security environments, and also advances the notion that despite the FUD the cloud may in fact be safer for certain kinds of applications...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

RSA Conference 2012 Wrap-Up

March 04, 2012 Added by:Robb Reck

RSA 2012 is in the books. The crypto-geniuses have gone home and are again working on solving our most challenging technical problems. The rest of us have returned home with some new insights and an improved plan for implementing security in our own little corners of the world...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud - Security and Incentives

March 04, 2012 Added by:Rafal Los

A cloud service provider who isn't doing well at meeting security controls and requirements has two options - ignore the voluntary attestation and stay off the STAR registry, or only answer certain parts. This makes it impossible to have a level playing field...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Apple’s PC Free Feature: Insecure, But Maybe That’s Good

March 02, 2012 Added by:Brent Huston

During the WWDC keynote, Brent Huston spent considerable time discussing the lack of built-in security for the iOS. Each unique identifier on numerous devices would allow possibly unwanted users to see information they shouldn’t see. In some cases, not such a bad idea...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cross-Border Sovereignty Issues in the Cloud

March 02, 2012 Added by:Rafal Los

It's about due care, process, and not rushing into a cloud computing migration. Take a rational approach and first understand the parameters you need to operate. Then enforce with prejudice those requirements on your vendors and know the way cloud computing is delivered...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

The Cloud’s Low-Rent District

March 01, 2012 Added by:Dave Shackleford

How many CSPs would take security more seriously if they knew there was a provision in every contract stating that customers could publicly describe security failings and immediately move their data and systems elsewhere with no questions asked? I’m sure you’re saying yeah, right...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Cyber Insurance: Efficient Way to Manage Risk in the Cloud?

February 27, 2012 Added by:David Navetta

While customers may enjoy some short term cost-benefits by going into the Cloud, they may be retaining more risk then they want - especially where Cloud providers refuse to accept that risk contractually). Cyber insurance may be a solution to help solve the problem...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

A Checklist for a Move to the Cloud

February 26, 2012 Added by:Ben Kepes

There’s s flip side to technology democratization in that the high level of accessibility also means that it’s very easy for organizations to set themselves up as vendors – sometimes without the necessary level of professionalism that would be optimal...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

New EU Data Regulations – What Companies Need to Consider

February 23, 2012 Added by:Fergal Glynn

EU Data Protection Authorities will apply these rules even if this information is processed outside of Europe, it’s not clear today whether these new rules will have an impact on the existing Safe Harbor regulations – something to watch out for in the consultation period...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud Part 1: An Overview

February 23, 2012 Added by:Rafal Los

Cloud computing isn't a paradigm every organization will follow whole-hog, nor should it be. Public cloud, hybrid cloud, private cloud, these are all terms need to be understood first and have some sort of rational approaches to security and risk management around them...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »