On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security…Read More
While scrambling data helps keep hackers on the outside looking in, it may also place cloud computing vendors in an adverse position to process those workloads.
It may be best for agencies to focus on the social and cultural aspects of cloud security strategies as they await future development of technical innovations.
Cyber criminals go to where the data is. More and more data is moving to the cloud, so more attacks are moving to the cloud. That’s not to say that mobile devices aren’t a great way to attack the cloud…they are. However, since more critical data is moving to the cloud, we will see a…Read More
Referencing Wikipedia: The Pythia , commonly known as the Oracle of Delphi, was the priestess at the Temple of Apollo at Delphi, located on the slopes of Mount Parnassus. The Pythia was widely credited for her prophecies inspired by Apollo. Amazon Web Service’s (AWS) first user conference in November 2012 was over-subscribed and sold out. Given that the company offers all the infrastructure you need…Read More
Dell World this week was huge. In addition to turning up the cloud strategy to full volume, Dell had Bill Clinton as a guest speaker. Very worthwhile conference, especially the Dell World Social Think Tank: IT Innovation, where I joined about 10 senior cloud thought leaders and another dozen execs from Dell for an invitation-only…Read More
What are some things that we should be watching out for around Cloud Security in 2013? This time every year, Raimund Genes, Trend Micro’s Chief Technology Officer (CTO) and his colleagues here take stock of what they’ve seen in the past year and what they think we can expect in the coming year. For 2013, in the area…Read More
Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing. Participants: Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey) Stephen Spector, Dell cloud evangelist (@SpectorAtDell) Erica…Read More
In his 90 minute keynote address at the AWS re:Invent conference, Andy Jassy quite unabashedly gave these reasons for using AWS versus a private cloud, (at the 32 minute mark) : So public cloud adoption should be a no-brainer, right? Oh wait, but Andy omitted security in the public cloud – how can I trust…Read More
When you host applications in the public cloud, you assume partial responsibility for securing the application. The cloud provider, for example Amazon Web Services (AWS), secures the physical data center (with locked badge entry doors, fences, guards, etc.) in addition to securing the physical network with perimeter firewalls. This is no significant change from how…Read More