CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information CentricityRead More
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.
Securing the journey to virtualization is complicated by two factors – (1) risks that are present in the physical datacenter, and (2) those that are unique to virtualized environments. As enterprises rush to embrace the benefits of virtualization, they have also rushed to implement traditionally architected security solutions in virtualized environments. Unfortunately, while this approach is familiar to enterprises, it results in undesirable consequences.Read More
Data just isn’t portable in the cloud — it can get up and move on its own. Your information placed in the cloud will be available when you want it; you just won’t know where it’s living from one moment to the next.Read More
SecureCloud enables enterprises to govern and control cloud data using encryption and sophisticated encryption key management. The encryption used in SecureCloud is standard AES 128 bit encryption, but the brilliance of the technology lies in key management functionality that validates the identity and integrity of the cloud server.
Recently I sat down with Steve Kwan, Trend Micro’s Senior Director of SaaS Operations, to discuss the challenges he faces as he moves Trend’s datacenter operations into the cloud. Steve has a great deal of experience with both traditional and virtualized datacenters. Most recently he helped guide product strategy for 3Leaf Systems, a developer of…Read More
Cloud computing and mobile devices have revolutionized our personal and professional lives. These innovations have unlocked a new age of elasticity and mobility. Along with this digital revolution, an unexpected transformation is taking place at the heart of server workloads and mobile devices. We are witnessing the decline of the general purpose operating system. The…Read More
While Companies are still trying to figure out how the cloud will benefit them, cybercriminals have already figured it out. They managed to infect so many computers that they have more computing power at their fingertips than all the world’s supercomputers combined. Do they use it as a weapon of mass distruction? No, and why…Read More