Items Tagged with "Cloud Security"
November 22, 2011 Added by:Robert Siciliano
Security is paramount. Amazon states: “In order to provide end-to-end security and end-to-end privacy, AWS builds services in accordance with security best practices, provides appropriate security features in those services, and documents how to use those features..."
November 15, 2011 Added by:Headlines
“India welcomes the decision of the EastWest Institute to bring this powerful forum to New Delhi. Working together with like-minded countries and businesses worldwide, India will work hard to assure that practical advances in cybersecurity are made and international cooperation advanced..."
November 13, 2011 Added by:Ben Kepes
The report gives a higher rating to applications that have native integration, and kind of discounts the awesome work that third party integrators are doing to tie together application as somehow inferior. But the report then goes on to give one example of a native integration...
November 10, 2011 Added by:Paula Skokowski
The potential for a data breach a lot higher with the launch of Apple's iCloud. When content changes on one device, all other devices are automatically updated. A wonderful service for consumers; however, for enterprises iCloud has the potential to wreak havoc...
November 03, 2011
"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."
November 03, 2011 Added by:David Navetta
NIST intends the definition "to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing..."
November 02, 2011 Added by:PCI Guru
This SIG is to be created to guide merchants and service providers in what should be the result of a proper risk assessment, not create another risk assessment methodology. While such an Information Supplement is an admirable ideal, you understand why this SIG is a losing proposition...
October 31, 2011 Added by:Enno Rey
Recently Apple launched its new offering iCloud. At this point, most infosec people start to worry a little bit: The common cloud concept of centralized data storage on premise of a third party does not cope well with the usual control focused approach of most technical infosec guys...
October 26, 2011 Added by:Brittany Lyons
The future of data storage online is certainly cloud computing, as it provides instant access to data under a heavy load and redundant backups for when the inevitable fail should happen. The security measures that go into protecting this future will only become more stringent as time goes on...
October 24, 2011 Added by:Kevin L. Jackson
In considering cloud computing for the Intelligence Community, security is an obvious concern. Classified information should always be processed in properly protected and certified IC private or community clouds. If a secure cloud model can be designed, economic savings can certainly be realized...
October 18, 2011 Added by:Headlines
NIST’s role is to help accelerate the secure and effective adoption of cloud computing. The agency leads efforts to develop standards and guidelines and advance cloud computing technology in collaboration with standards bodies, businesses, and government agencies...
October 11, 2011 Added by:Robert Siciliano
The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...
October 06, 2011 Added by:Headlines
SICE - A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms: "We have significantly reduced the surface' that can be attacked by malicious software. Previous techniques have exposed thousands of lines of code to potential attacks..."
October 05, 2011 Added by:Bill Gerneglia
It is imperative to select and deploy a proven set of cloud core services. These include storage management controls, hypervisors, security policies and security software including firewalls, disaster recovery and governance, and database administration and replication services...
October 05, 2011 Added by:Rafal Los
Dynamic Application Security Testing (DAST) is one of the long-standing staples of Software Security Assurance, and has been the anchor by which many organization have boot-strapped their efforts to write better code. Whether this is the correct approach or not is not the question...
October 04, 2011 Added by:Kevin L. Jackson
Cloud computing is unique in its ability to address critical defense and intelligence needs. That’s why the cloud is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiency and incur cost savings...