If you still believe that your systems management consoles should be running on servers in your data center, you’re definitely from the pre-cloud era. Even if you believe your systems management and security consoles should be running on infrastructure as a service instances you control, you’re also out of date. The evidence is in, and…Read More
Over the past weeks we have been reviewing the top 10 tips for securing instances running on Amazon Web Services. We walked through the critical controls as part of the AWS shared security model. As noted in these tips, host-based security capabilities such as intrusion detection and prevention, anti-malware, and integrity monitoring are critical for…Read More
Cybercriminals are getting more advanced and learning how to attack companies in new and innovative ways every day. Mark Seward, senior director of security and compliance at Splunk, wrote on The Guardian that with these attacks comes a responsibility from companies to protect against breaches in the best way possible.
Amazon Web Services did it again. Its new service, OpsWorks, is an application management service with the ability to manage applications of any scale or complexity in the AWS cloud. This integrated system manages resource provisioning, configuration management, application deployment, software updates, and monitoring and access control. The service is another offering from the leader in…Read More
It’s often wondered just how much digital interactions on Twitter truly impact the physical world. An instance this week showed a small taste of just how powerful the website can be in the wrong hands, as The Associated Press’ Twitter feed was hacked to display the message “Breaking: Two Explosions in the White House and Barack Obama is injured” to the organization’s nearly 2 million followers.
Looking for better data security support, The Credit Union Times said financial service trade associations are supporting bills passed by the House this week that would enforce federal agency security and increase research and development.
It wasn’t long ago that companies had to figure out the Wi-Fi system for their company and how they wanted to make sure everything was secure across the network. Now, businesses are dealing with mobile devices as a transformative technology and must work to figure out a BYOD (Bring your own Device) plan before it is too late
By Jamie Haggett I’m sure you’ve watched the news in the last few months and have seen a ton of high profile hacks on Twitter, including big brands such as Jeep, Burger King, and most recently the Associated Press (AP). I think the average person outside of the computer world is left wondering a few…Read More
(Click on twice to enlarge.)Read More
Dealing with cloud computing security risks and regulations has never been easy. Davey Winder on CloudPro likened the development of cloud standards and best practices to herding cats, bordering on very difficult to impossible, as the technology does not recognize international or industrial boundaries.