A recent study conducted by the Ponemon Institute, an independent research firm that specializes in information and data security, suggests there may be significant differences of opinion between users and vendors when it comes to cloud computing security. The study, entitled Security of Cloud Computing Providers, surveyed 103 cloud computing service providers in the U.S….Read More
As advanced mobile devices, such as smartphones and tablets, continue to play a growing role in the lives of employees, the need for enterprise IT departments to secure these devices is becoming increasingly evident. According to a recent report by research firm Strategy Analytics, the majority – 61 percent – of U.S. corporations now support…Read More
Applying the latest cloud provisioning and marketing analytics technologies, they’ve created an entirely new type of cloud service, Exploits as a Service, or EaaS.Read More
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.Read More
Today’s disclosure by Google and Microsoft that they were tricked into serving malware highlights an inherent conflict of interest between advertising-based businesses and the security needs of their customers.Read More
Cloud Security Alliance Congress 2010 Summary – Part 4 of 4 The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days. For those who were not in attendance at…Read More
It’s exciting to see that the GSA is leading the way to modernize the federal government’s IT by moving to “the cloud.” However, in the rush to save money, the GSA may be repeating some mistakes that company IT departments have already made. Until cloud vendors step up to guarantee that their security is on par with enterprise security, they will be a poor choice for our government agencies. We don’t need another WikiLeaks.Read More
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.