Do you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you “burst” the additional workload to an external cloud on an on-demand basis.Read More
A year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!
Two of the most useful resources…
Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.Read More
Bluetooth technology lets you set up a wireless network that can be used to connect any devices that are equipped with the technology. Bluetooth is used in a wide variety of devices, including home entertainment systems, phones, and computers. One of the most widely used implementations of Bluetooth is headsets for cell phones. Bluetooth can…Read More
Most of us are aware of the need to protect our computers, but what about our cell phones? Can phones be infected with viruses or other malware? Unfortunately, the answer is yes. Smartphones (phones that have Internet capabilities and function more as mini-computers, such as the Droid or iPhone) can be at risk for viruses…Read More
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.Read More
I’m constantly annoyed by how broad the term “cloud” can be, and I try to use IaaS, PaaS, and SaaS instead, but even these categories are blurring at the edges. The bottom line is that if it’s hooked up to the internet, it can be controlled from a central location, and it scales up and down on demand, it’s in the cloud.Read More