Items Tagged with "Cloud Security"


0926052d146f791d33534b681a7365a1

Fine-Tuning Security For Your Cloud Environment

August 14, 2013 Added by:Bret Clement

A tune-up of your cloud environment can potentially save you money and improve your performance.

Comments  (0)

483d57221cc733958be20869f1c7e400

Five Factors InfoSec Teams Should Consider When Deploying to the Cloud

June 28, 2013 Added by:Phil Cox

Anybody who works with central IT staff at larger enterprises recognize the common questions around security and compliance from professional InfoSec teams. Here are some of the general guidelines that all InfoSec departments should consider when thinking about cloud deployments.

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch, the Yanks, the Cloud and YOU

December 13, 2012 Added by:Don Eijndhoven

Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

CloudBeat 2012 - "Whose job is cloud security?"

December 11, 2012 Added by:Rafal Los

People are still stuck on authentication, mainly passwords. We as an industry or customer base haven't been very good at figuring out how to manage identities, without sticking our customers with a million different sites which don't share common identities...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Terms of Service, and a Global Code

November 25, 2012 Added by:Ben Kepes

TOS;DR aims to help with what is possibly the biggest lie on the internet, that which users make when they click that they have read, understood and accepted the terms of service of their provider. The fact is that no one reads them but rather vaguely hopes for the best...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Software is Eating the World, And APIs are the Fuel For That

November 13, 2012 Added by:Ben Kepes

The cloud brings a level of agility that allows organization to be more nimble than before. Cloud powers workers in disparate geographies to collaborate on projects. Cloud enables the mobile provisioning of mass information in new ways. Cloud makes insights into vast stores of data more readily obtained...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

CloudSigma and the Perils of Choice

November 06, 2012 Added by:Ben Kepes

As we move to broader scale cloud adoption, one would be excused for assuming that we’d reached a point where the definition of what constitutes IaaS is set in stone – true different vendors package up their virtual servers with different specs, but IaaS is, to a greater or lesser extent, a fixed concept...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

The Security Reality of Road Warriors

October 28, 2012 Added by:Barrie Hadfield

Marketing and sales professionals will, inevitability, require a cloud-based collaboration processes or they face a potential competitive disadvantage. Therefore, IT executives are best-served by investigating the rate at which their employees are using unsanctioned tools that facilitate potential breaches...

Comments  (0)

09f36134733892ee0b4d16cf0fc98790

eSignatures Go Keyless in the Cloud

October 02, 2012 Added by:Victor Cruz

It has been 12 years since the US passed a law to facilitate the use of electronic records and electronic signatures. Called the Electronic Signatures in Global and National Commerce Act (ESIGN), its general intent in black and white is quoted in the very first section of the legislation...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Accessibility and the Untold Issue Around Cloud Computing

September 26, 2012 Added by:Ben Kepes

The decision was made during the consultation process that universal design and accessibility issues should be outside the scope of the document. That was a necessary decision as the drive was to come up with a readily consumable document that vendors could easily comply with...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Third Party Service Providers and PCI Compliance

September 25, 2012 Added by:PCI Guru

If a third party is providing your organization a service that has access to your cardholder data environment (CDE) or the third party could come into contact you’re your cardholder data (CHD), then that third party must ensure that the service complies with all relevant PCI requirements...

Comments  (3)

4c1c5119b03285e3f64bd83a8f9dfeec

Preparing Developers for Tomorrow’s Cloudy World

September 17, 2012 Added by:Ben Kepes

"The advent of cloud computing has removed infrastructure as a barrier to rapid and massive scaling of applications. [IaaS and Paas have] made it possible for a developer to create an application one day and have it utilized by hundreds of thousands of users the next..."

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs Seek Value But See Challenges with Cloud Computing

September 16, 2012 Added by:Bill Gerneglia

The face of corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – the fact is that in the long run individual organizations will not have email server administrators, desktop software support personnel or systems administrators...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Applications and Services on the Public Cloud Secure?

September 15, 2012 Added by:Rafal Los

Any application that was built to be secured independently of the environment will do as well in a public cloud as it did in your private data center. If you build the application to be low-risk independent of your environmental controls you shouldn't have to worry where it lives...

Comments  (0)

4de72ea3c29fd5b60b5b95627242871a

Data is the New Perimeter for Cloud Security

September 12, 2012 Added by:Mike Gault

The security market in 2012 is estimated at $60 billion, yet adding more layers of perimeter security may be completely useless against a determined sysadmin working on the inside. The end result is that your data might or might not be secure – you simply have no way to prove it...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »