Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

According to a recent Gartner study, by 2020, it will be unlikelythat any enterprise will have a "no cloud" policy, and hybrid will be the most common use of the cloud. While the benefits of leveraging public cloud infrastructures are well understood, the desire to keep critical workloads and data on-premise in the private data center still remains. For enterprises, the hybrid cloud provides a best of both worlds solution. However, the leading factor that determines the preference to the hybrid cloud, among other things, is "security." Moreover, as the growth of the public cloud infrastructure continues, it is not hard to observe two key directions of focus by the cloud providers, namely: The geographical expansiveness of their public cloud infrastructure to grow the number of availability zones The richness of their services catalog to ensure cloud adopters are n... (more)

[video] @CloudExpo Private Cloud Panel | #IoT #PaaS #BigData #DataCenter

The Hybrid Era: Where Is All the Private Cloud? Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers? In this power panel at 19th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, Commvault; Adam Rogers, Managing Director at ANEXIA; Yi Zheng, CPO and VP of Engineering at CDS Global Cloud; addressed these serious questions and examine the state of public and private cloud in the ... (more)

How to Restore App Data | @CloudExpo @eFolder #IoT #SDN #DataCenter

How to Restore Cloud Application Data Using eFolder Cloudfinder In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best preventions against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder. Speaker Bio Sam McIntyre is a Partner Enablement Specialist at eFolder. He has a Bachelor of Applied Science in Business Administration from the University of Oregon. 20th International Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference f... (more)

Oracle Named Exclusive Diamond Sponsor of Cloud Expo 2010

Oracle Keynote at Cloud Expo SYS-CON Events announced today that Oracle was named exclusive "Diamond Sponsor" of Cloud Expo 2010. Cloud Expo was announced on February 24, 2007, the day the term "cloud computing" was coined. That same year, the first Cloud Expo took place in New York City with 450 delegates. Next April, Cloud Expo is returning to New York City with more than 5,000 delegates and over 100 sponsors and exhibitors. An Exclusive Interview with Oracle's Richard Sarwal "Cloud" has become synonymous with "computing" and "software" in two short years. Cloud Expo is the new PC Expo, Comdex, and InternetWorld of our decade. By 2012, more than 50,000 delegates per year will participate in Cloud Expo worldwide. Oracle Maps Its Cloud Computing Strategy The cloud is certainly a compelling alternative to running all applications within a traditional corporate data... (more)

4th International Cloud Expo: Photo Album

Cloud Computing Expo on Ulitzer SYS-CON's 4th International Cloud Computing Conference & Expo, held on November 2 - 4, 2009, in Santa Clara, attracted more than 40 sponsors with over 2,000 delegates, a record attendance. The three content-packed days emphasized value with a rich array of sessions led by exceptional speakers about the business and technical value of cloud computing. Enjoy here our photo album of the show. Now held three times a year -- in New York, Prague, and Santa Clara -- the Cloud Computing Conference & Expo series is the fastest-growing Enterprise IT event in the past 10 years, devoted to every aspect of delivering massively scalable enterprise IT as a service. The event in Santa Clara, CA, was co-located with our 7th International Virtualization Conference & Expo. Cloud Computing Expo 2010 East to Attract More Than 5,000 Delegates from ... (more)

4th International Cloud Computing Conference & Expo Starts Today

A round-up of the wide range of important issues and timely topics due to be discussed by over 130 industry experts at SYS-CON's 4th International Cloud Computing Conference & Expo, opening today at the Santa Clara Convention Center, in Santa Clara, CA. The event runs from November 2-4, 2009. Building Scalable and Extensible RIAs in the Cloud - Ranjith Ramakrishnan, Co-Founder & CTO of Cumulux, will be co-presenting a session in which delegates will learn how to build scalable and extensible RIAs on the Windows Azure Cloud. The session will cover enabling rich and complete User Experience customizations and addressing multi-tenant requirements. Cloud Security - is the focus of a whole welter of sessions in Santa Clara. "It's Nothing New; It Changes Everything!" is the title of the session being given by Sun's Chief Security Architect Glenn Brunette, for example. Brunett... (more)

Announcing The Global Governmental Cloud Computing Roundtable

I am happy to announce my involvement as both instigator and moderator in an upcoming roundtable discussion on Global Governmental Cloud Computing coordinated by Foreign Affairs and International Trade Canada (DFAIT) and GTEC 2009 on October 6th in Ottawa, Canada. The purpose of this by invitation meeting is to provide an international forum for leading government CIOs and CTOs to discuss the opportunities and challenges of implementing cloud computing solutions in the public sector. We expect a total of 20 to 25 leading international government representatives to participate in the discussions. The sessions will be moderated by Reuven Cohen (me) and will include opening remarks by Jirka Danek, Chief Technology Officer, Public Works and Government Services Canada. The event will include round table discussions among the foreign and Canadian government representati... (more)

The Secret Behind The Incredible Growth of Cloud Expo

A few minutes ago I received an email questionnaire informing me that "The Center for Exhibition Industry Research (CEIR) has once again partnered with George P. Johnson Experience Marketing to conduct this essential and timely research. This year's study is being co-produced with The Jordan Edmiston Group, Inc. and with support from the Event Marketing Institute." The first question of this survey is: Which one of the following best describes the role of "digital marketing" when you are planning an event? a)      A leading tactic b)      A vital component of the plan c)       Taken under consideration with other mediums d)      Usually an afterthought e)      Don't really consider it I was shocked to see this question and equally shocked to read the selection of possible answers! First, allow me to present the facts, which reflect the reality of the media business in... (more)

Size Doesn't Matter. Controlling Big Data Through Cloud Security

There’s data. And then there’s BIG DATA. Many of us have been bombarded with the term in many frameworks. There are some professionals that chalk it up to marketing hype or meaningless buzzword. Personally, I prefer the way Gartner categorizes it. That it is more than size. It is a multi-dimensional model that includes complexity, variety, velocity and, yes, volume. But the pressing issue with this definition of Big Data is how best to secure something so vast and multifaceted. If you recognize the old concept of a network perimeter is antiquated and dangerously narrow, there should be some concern as to corralling all this data and ensuring its transit and storage is protected. The latter issue speaks directly to compliance needs. Banks and other financial institutions, medical facilities, insurance, retailers and government entities are especially sensitive to the ... (more)

Security Posture Management Enters the Cloud

When eGestalt of Santa Clara, CA, announced in November they were launching a cloud-based security and compliance solution, it set the stage to change the way enterprise businesses could cope with complex compliance and security issues. The solution, powered by Rapid7 scanning technology, was to deliver a "pure" cloud-based IT security monitoring and compliance management product that worked in real time without requiring any hardware, "a first of its kind solution," say the vendors. Called Aegify, the technology delivers Security Posture Management (SPM), which first measures the security status of all assets within a network, then delivers a report that can be used to remediate problems, strengthen security, and create and manage compliance policies. It leverages the compliance and security engine of eGestalt's SecureGRC (governance, risk management and complian... (more)

2014 Trends – The Year of the Insider Threat

If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders - case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, there is now an added layer of complexity and sophistication when it comes to protecting who can access what types of sensitive data. The cloud makes it easier for organizations to conduct business, but that simplicity also translates into easier ways for insiders or un-trusted individuals to steal data - identity has become the new perimeter. The number of organizations around the globe turning to a combination of traditional computing, virtualization, and public-cloud infrastructure to deliver business applications quickly, efficiently, and cost effectively is growing exponentially. ... (more)