Items Tagged with "Cloud Security"


4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Security – It’s All About Partnership

November 28, 2011 Added by:Ben Kepes

Cloud security is a two way street – both vendors and customers have a part to play in keeping it safe, and both parties need to bring something to the table. But, notwithstanding this fact, Cloud is still the best option for a number of SMB use cases...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GovCloud.com: New Hub for Government Cloud Computing

November 28, 2011 Added by:Kevin L. Jackson

GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Cloud of Clouds: Amazon Web Services

November 22, 2011 Added by:Robert Siciliano

Security is paramount. Amazon states: “In order to provide end-to-end security and end-to-end privacy, AWS builds services in accordance with security best practices, provides appropriate security features in those services, and documents how to use those features..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

India Assumes Global Leadership Role in Cybersecurity

November 15, 2011 Added by:Headlines

“India welcomes the decision of the EastWest Institute to bring this powerful forum to New Delhi. Working together with like-minded countries and businesses worldwide, India will work hard to assure that practical advances in cybersecurity are made and international cooperation advanced..."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Flawed Analysis: On Clouds “Playing Nice”

November 13, 2011 Added by:Ben Kepes

The report gives a higher rating to applications that have native integration, and kind of discounts the awesome work that third party integrators are doing to tie together application as somehow inferior. But the report then goes on to give one example of a native integration...

Comments  (0)

24a688dde3dc9dcafbbd5dfdcf575d03

Is iCloud the Next Big Security Challenge?

November 10, 2011 Added by:Paula Skokowski

The potential for a data breach a lot higher with the launch of Apple's iCloud. When content changes on one device, all other devices are automatically updated. A wonderful service for consumers; however, for enterprises iCloud has the potential to wreak havoc...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Mike Dahn and Martin McKeay on Compliance in the Cloud

November 03, 2011

"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NIST Releases Final Definition of Cloud Computing

November 03, 2011 Added by:David Navetta

NIST intends the definition "to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing..."

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

This Year’s PCI SSC SIG Proposals

November 02, 2011 Added by:PCI Guru

This SIG is to be created to guide merchants and service providers in what should be the result of a proper risk assessment, not create another risk assessment methodology. While such an Information Supplement is an admirable ideal, you understand why this SIG is a losing proposition...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

To iTrust or Not?

October 31, 2011 Added by:Enno Rey

Recently Apple launched its new offering iCloud. At this point, most infosec people start to worry a little bit: The common cloud concept of centralized data storage on premise of a third party does not cope well with the usual control focused approach of most technical infosec guys...

Comments  (0)

8ab4e596af60cabbf46c7ecf016af0ad

Is Cloud Computing Secure?

October 26, 2011 Added by:Brittany Lyons

The future of data storage online is certainly cloud computing, as it provides instant access to data under a heavy load and redundant backups for when the inevitable fail should happen. The security measures that go into protecting this future will only become more stringent as time goes on...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

The Economic Benefit of Cloud Computing

October 24, 2011 Added by:Kevin L. Jackson

In considering cloud computing for the Intelligence Community, security is an obvious concern. Classified information should always be processed in properly protected and certified IC private or community clouds. If a secure cloud model can be designed, economic savings can certainly be realized...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Cloud Technology Roadmap to be Introduced

October 18, 2011 Added by:Headlines

NIST’s role is to help accelerate the secure and effective adoption of cloud computing. The agency leads efforts to develop standards and guidelines and advance cloud computing technology in collaboration with standards bodies, businesses, and government agencies...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How the Cloud Will Change Technology

October 11, 2011 Added by:Robert Siciliano

The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Develop Enhanced Security for Cloud Computing

October 06, 2011 Added by:Headlines

SICE - A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms: "We have significantly reduced the surface' that can be attacked by malicious software. Previous techniques have exposed thousands of lines of code to potential attacks..."

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Keys To Successful Cloud Application Deployment

October 05, 2011 Added by:Bill Gerneglia

It is imperative to select and deploy a proven set of cloud core services. These include storage management controls, hypervisors, security policies and security software including firewalls, disaster recovery and governance, and database administration and replication services...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »