On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security…
Read MoreBy Aman Chand At Trend Micro we talk a lot about the importance of protecting our digital lives. In todayās web-enabled universe, we do so much online now that it has become second nature to jump on the Internet at a momentās notice, but itās easy to let our guard down and forget the risks…
Read MoreDo you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you āburstā the additional workload to an external cloud on an on-demand basis.
Read MoreIn a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as āthe worldās largest cloud.ā Heās right. Cybercriminals use Conficker to create massive clouds of remotely-controlled PCs capable of carrying out a variety of cyber-attacks, including DDoS (Distributed Denial of Service) attacks on a scale larger than any centralized cloud provider could. We…
Read MoreEveryone is familiar with the traditional nursery rhyme, āLondon Bridge is Falling Down.ā However, few know that it traces its roots back to a factual wonder of the medieval world.
The original London Bridge struggled from a problem facing the cloud computing model… overcommit. Resource pooling provides fantastic economies of scale, but what happens when everyone needs the resources at the same time? The bridge could support the houses or a massive amount of traffic, just not both.
Read MoreThe cloud is putting so much pressure on the old device-centric security model that it’s forcing a change to an identity-centric security model, where it matters far more who a person is than what device or network they are using. In a single day, one person might access cloud applications from his iPhone, home, main office, and Peetās Coffee, and he may use his home PC, his work laptop, his phone, or even his Xbox. Trying to identify and secure what that person does based on a device IP address or network address is simply a lost cause.
Amazon EC2 customers recently suffered from a concerted Distributed Denial of Service (DDoS) attack that caused some consternation for the web-based code hosting service Bitbucket (news courtesy of my favorite IT tabloid, The Register).Ā An unfortunate fact of life about the massive DDoS such as Bitbucket appears to have suffered is that there is no…
Read MoreEvery day brings more headlines about social networking, cloud computing and Software as a Service (SaaS).Ā Each of these fast growth areas shares an important element in common ā they rely on a movement of data from private computers into the public cloud.Ā The theory goes that this data is protected by the service provider…
Read More