In San Francisco last week, AWS opened their summit series for 2014. 5000+ people packed into the Moscone Center, and there was a ton of energy in the air. I was fortunate enough to have the opportunity to attend and to speak. I presented, “Updating Security Operations for the Cloud,” which is the talk I’ve…Read More
Lately, I’ve been looking at our approach to updating security operations to deal with the realities of hybrid and full cloud environments. If you’ve missed the series so far, I’d recommend reading the first and second posts now. This post is going to highlight a few of the challenges that your network security monitoring practice…Read More
Last fall, AWS launched AWS Activate. This program helps make it easier for startups to get up and running on AWS by providing access to resources tailored to their specific needs. We’re always looking for new ways to team up with AWS, and we’re happy to announce that the latest update to the program now…Read More
The advent of software-as-a-service (SaaS) has changed how enterprises approach their IT operations, with many departments now regarding server infrastructure management, maintenance and vigilant security monitoring as tasks properly assigned to their cloud providers.
Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a couple of our earlier blog posts on cloud-based security and threats from the cloud discussed. The “Cloud” and security within…Read More
Big data is becoming a huge issue in modern technology, as more companies are now aware of some of the great benefits use of large pools of information can have in predictive analytics and customer relations. However, there are still many who don’t think about data center security.
The Cloud Security Alliance recently released a white paper on cloud computing vulnerability incidents spanning the last five years. They looked at more than 11 thousand news articles regarding cloud computing-related incidents to determine the top reasons behind outages. Did you know 64 percent of the outages can be attributed to one of three causes: Insecure Interfaces…Read More
The waters of cloud security remain relatively murky for some, as many third-party contractors get involved in the highly collaborative process. Infocomm Development Authority of Singapore to define a new scheme under the CSA Open Certification Framework and the Singapore Multi-Tier Cloud Security standard.
One of the biggest enemies of cloud security within a company isn’t outsider threats or even knowing insiders: It’s employees who aren’t following the rules and likely don’t even know it. Forbes reported that CEB, an advisory firms, found 60 percent of firms have suffered a major data breach and don’t even know it.
Businesses are always looking for ways to strengthen their data security and alleviate customer concerns. Many may figure that using a bigger company for data storage and sharing information may be the best way to go, but a recent report by the Electronic Frontier Foundation looked at major companies with cloud computing and storage services being entrusted by businesses and asked what the provider does to keep private information out of the hands of the government.