Cloud adoption among small- and medium-sized businesses is expected to increase over the next three years, as SMBs turn to the technology to leverage potential cost savings and other benefitsRead More
Dedicated Instances are Amazon EC2 instances launched within your Amazon Virtual Private Cloud (Amazon VPC) that run hardware dedicated to a single customer.
Of course, the humor here is that Amazon didn’t explain which hardware it was referring to. If you compare it to an enterprise server in a private data center, it’s clearly less secure (unless you applied cloud specific security and encryption tools perhaps). But if you compare it to existing hosting offering, it’s no less secure than enterprise grade hosting has been for a decade.Read More
Surveys indicate that security is the number 1 challenge about the cloud. Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues. Dave Asprey, VP-Cloud Security for Trend Micro, presented to the SD Forum these 16 valuable points of advice regarding data privacy in the cloud. PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….Read More
A year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!
Two of the most useful resources…
Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.Read More
Bluetooth technology lets you set up a wireless network that can be used to connect any devices that are equipped with the technology. Bluetooth is used in a wide variety of devices, including home entertainment systems, phones, and computers. One of the most widely used implementations of Bluetooth is headsets for cell phones. Bluetooth can…Read More
Most of us are aware of the need to protect our computers, but what about our cell phones? Can phones be infected with viruses or other malware? Unfortunately, the answer is yes. Smartphones (phones that have Internet capabilities and function more as mini-computers, such as the Droid or iPhone) can be at risk for viruses…Read More