CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information CentricityRead More
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.
Securing the journey to virtualization is complicated by two factors – (1) risks that are present in the physical datacenter, and (2) those that are unique to virtualized environments. As enterprises rush to embrace the benefits of virtualization, they have also rushed to implement traditionally architected security solutions in virtualized environments. Unfortunately, while this approach is familiar to enterprises, it results in undesirable consequences.Read More
Data just isn’t portable in the cloud — it can get up and move on its own. Your information placed in the cloud will be available when you want it; you just won’t know where it’s living from one moment to the next.Read More
Plenty of regulatory regimes mandate that enterprises have a segregation of duties or separation of duties as a required internal control mechanism. Separation of duties divides the responsibility of a critical task among different people and provides “checks and balances” against fraud or error.Read More
SecureCloud enables enterprises to govern and control cloud data using encryption and sophisticated encryption key management. The encryption used in SecureCloud is standard AES 128 bit encryption, but the brilliance of the technology lies in key management functionality that validates the identity and integrity of the cloud server.
Pop the champagne corks! Trend Micro announced the public beta of Trend Micro SecureCloud – an exceptionally cool new offering that you can take for a test drive today. We can finally talk openly about a technology and business approach that addresses cloud security and data governance issues that have been confronting the industry (see…Read More
The noise about cloud computing is getting louder as the year goes on (Yankee Group: Infrastructure as a Service now a bona fide cloud strategy, Nimbula: ‘Cloud computing’ start-up wins $15M from Accel, Sequoia, Ready or not, cloud is coming) . Usually fads of the IT industry fade quite quickly after the press and analysts…Read More
In March the Cloud Security Alliance published “Top Threats to Cloud Computing V 1.0” to help organizations better understand the risks of cloud computing and to consequently make more informed risk management decisions when adopting cloud strategies. In that document the CSA outlined seven threats and suggested steps for remediation. At Trend we have traditionally…Read More
As I read different blogs, IT industry analysts and media, I see contradictions galore. Some articles position cloud computing as more secure (like this one) while other journalists highlight new security challenges (here, here, here and here). The concept of the cloud is still emerging and fallacies around cloud computing abound. Below are the five…Read More