The advent of software-as-a-service (SaaS) has changed how enterprises approach their IT operations, with many departments now regarding server infrastructure management, maintenance and vigilant security monitoring as tasks properly assigned to their cloud providers.Read More
The waters of cloud security remain relatively murky for some, as many third-party contractors get involved in the highly collaborative process. Infocomm Development Authority of Singapore to define a new scheme under the CSA Open Certification Framework and the Singapore Multi-Tier Cloud Security standard.
Dell World this week was huge. In addition to turning up the cloud strategy to full volume, Dell had Bill Clinton as a guest speaker. Very worthwhile conference, especially the Dell World Social Think Tank: IT Innovation, where I joined about 10 senior cloud thought leaders and another dozen execs from Dell for an invitation-only…Read More
Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing. Participants: Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey) Stephen Spector, Dell cloud evangelist (@SpectorAtDell) Erica…Read More
The U.S. Department of Defense (DOD) is planning a full-scale move to cloud storage solutions in order to assist with its overall data security program.
Today at Interop New York, I am discussing “Where to Store the Cloud Encryption Keys.” The topic centers around the core cloud management decisions, which I’ve whittled down to eight key considerations. To help with those decisions, I’ve created the Cloud Management Key Decision Matrix to help establish a clear path between those considerations and…Read More
Relying on a cloud security vendor to always do right by you may not be the best solution when it comes to maintaining corporate data storage.
As mobile and computing technology become more available internationally, the number of people with access to the cloud is exploding.
We often hear that security and privacy concerns are the main inhibitors to cloud adoption. But what are the true threats? Is the cloud really more dangerous than your on-site data center? I would say that virtualization and cloud computing aren’t inherently more dangerous, but they have unique infrastructure that must be addressed when creating…Read More
By saying that encryption is not enough for cloud security, I don’t mean that you also need other types of protection like server security, identity management, etc. I think most people deploying cloud computing plan to implement more than encryption for security. What I mean is that encryption alone is not enough in an encryption…Read More