Applying the latest cloud provisioning and marketing analytics technologies, they’ve created an entirely new type of cloud service, Exploits as a Service, or EaaS.Read More
Dedicated Instances are Amazon EC2 instances launched within your Amazon Virtual Private Cloud (Amazon VPC) that run hardware dedicated to a single customer.
Of course, the humor here is that Amazon didn’t explain which hardware it was referring to. If you compare it to an enterprise server in a private data center, it’s clearly less secure (unless you applied cloud specific security and encryption tools perhaps). But if you compare it to existing hosting offering, it’s no less secure than enterprise grade hosting has been for a decade.Read More
Surveys indicate that security is the number 1 challenge about the cloud. Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues. Dave Asprey, VP-Cloud Security for Trend Micro, presented to the SD Forum these 16 valuable points of advice regarding data privacy in the cloud. PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….Read More
In our hectic cloud-based world, devops (the mixing of infrastructure operations with software development) has become the standard way we build and run high-scale sites from IaaS to SaaS. There are lessons to be learned from how we got here, especially because devops isn’t very security friendly.Read More
A year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!
Two of the most useful resources…
Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.Read More
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.Read More