Archive for the ‘Cloud computing’ Category

The Big Shift to Cloud-based Security

Keeping IT systems secure and running within regulatory compliance mandates, especially for mid-sized and even small businesses, seems next to impossible. There are many reasons for this — but fortunately, several recent technological trends show that it doesn’t have to be this way. This paper covers how small and medium-sized organizations can manage their IT […]

Leave a Comment

Cloud services breached via Google code search

Researchers at Stach & Liu, a security consulting firm, have advised organizations against storing critical information on the public cloud until there are better intrusion detection systems available for cloud services, the Dark Reading website reports. The firm made the recommendation after discovering that access codes and passwords to thousands of public cloud services could […]

Comments (2)

Inside IT: Cloud Computing & Security

IT Best Practices: The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor of services, but brings with it increased security concerns. In this podcast, Alan Ross, who leads the Security Architecture […]

Comments (2)

Security as a Service and Office as a Service

The Windows Intune cloud service helps you centrally manage and secure your PCs through a simple web-based console, whether your IT staff or end users are in the main office, at a branch office, or on the road. Click the fig below to see a video of Windows Intune benefits: Windows Intune simplifies and helps […]

Leave a Comment

CSA at RSA 2011 – Solving the Cloud Security Equation

Visibility + Control = Trust Federal Cloud Computing Strategy: Cloud First Policy “This policy is intended to accelerate the pace at which the government will realize the value of cloud computing by requiring agencies to evaluate safe, secure cloud computing options before making any new investments.” Titles on How to Secure the Cloud ….

Leave a Comment

Businesses deemed lack of security a major concern for cloud computing

By NICK CLAYTON – WSJ.com As the much-hyped next big thing in information technology, the cloud in cloud computing seems almost too apt as a metaphor. Constantly moving and changing, impossible to pin down and the closer it gets, the harder it is to distinguish from fog. It has divided opinion. On one side are […]

Comments (2)

Cloud Computing: A Treasure Trove for Hackers

Image by Ivan Walsh via Flickr Above the Clouds: Managing Risk in the World of Cloud Computing By Dick Weisinger Security usually tops the lists of concerns that people have about the cloud. And now it seems like there is good reason. On a recent survey of 100 “elite” hackers at the 2010 Defcon conferenece, […]

Comments (4)

What You Can Do About Cloud Computing Security

Cloud computing security risks are sometimes considered greater than cloud’s rewards. The industry is working to change that, and so can you. By James A. Martin Cloud computing offers many compelling benefits to organizations, such as reduced capital and operating costs and as-needed scalability. So why aren’t more businesses taking advantage of the on-demand computing […]

Comments (3)

How to manage risk in the cloud

What is Cloud Computing and does it provide more protection to your business? Pre-order the Softcover; Pre-order the eBook. Cloud Computing will bring many benefits to organisations, some of which include reducing operating costs, reducing power consumption and freeing you up to focus on your core business. The concept of shifting computing to a shared […]

Comments (4)

ENISA Cloud Computing Risk Assessment

Image via Wikipedia Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance The ENISA (European Network and Information Security Agency) released the Cloud Computing Risk Assessment document. The document does well by including a focus on SMEs (Small and Medium sized Enterprises) because, as the report says, “Given the reduced cost and flexibility […]

Comments (1)

Web Services and Security

Cloud Security and Privacy Because of financial incentive, malicious software threats are real and attackers are using the web to gain access to corporate data. Targeted malicious software’s are utilized to steal intellectual property and other confidential data, which is sold in the black market for financial gain. With use of social media in corporate […]

Leave a Comment

Way beyond the edge and de-perimeterization

Image by pittigliani2005 via Flickr De-perimeterization term has been around almost for a decade and finally industry is taking it seriously because of virtualization and cloud computing popularity. Is it time for businesses to emabrace de-perimeterization? De-perimeterization is a double edge sword for industry which creates scalable options for operation and huge challenges for safeguarding […]

Comments (1)

Cloud Computing Pros and Cons

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud Cloud computing is the future of the computing, which happens to provide common business applications online that run from web browser and is comprised of virtual servers located over the internet. Basic idea behind cloud computing is the accessibility of application and data from any […]

Comments (1)

Virtualization and compliance

Image by lodev via Flickr The core technology utilized in the cloud computing is virtualization. Some organization may not want to jump into cloud computing because of inherent risks can take a shot at virtualization in their data centers. Virtualization can be utilized to reduce hardware cost and utility cost. Organization that might have 100 […]

Comments (2)

Cloud computing and security

Cloud computing provide common business applications online that run from web browser and is comprised of virtual servers located over the internet. Main concern for security and privacy of user is who has access to their data at various cloud computing locations and what will happen if their data is exposed to an unauthorized user. […]

Comments (1)