Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
In a recent blog post, we discussed the emergence of Cloud Protection Gateways as a solution for enterprises looking to protect sensitive cloud data by keeping that data under their complete control. We started looking at the vetting process enterprises undertake when they are selectin...
Multi-tenant environments bring a new set of challenges when it comes to security. In his session at the 12th International Cloud Expo, Omar Khawaja, Global Principal, Security Solutions, at Verizon Terremark, will provide a structured and sequenced data-centric security approach to ...
Through a great deal of research on enterprise cloud adoption and security, I’ve learned something telling. As you would expect, CISOs’ opinions about cloud strategy are quite varied. While many folks recognize their company’s use of SaaS for HR, sales, communication, and other applica...
As the proliferation of the cloud continues, Cloud Protection Gateways are increasingly being discussed as a way to address security issues surrounding cloud adoption. Whatever stage of cloud adoption your organization is in, a thorough vetting of the different gateways available will ...
The convenience, efficiency and cost benefits cloud computing offers organizations has made moving healthcare data and records to the cloud make sense for hospitals, physicians and other healthcare providers. Security and data breaches are a concern for any industry utilizing the cloud...
A recent survey has shown that security policies and rules set down by IT departments are not just being ignored but having a bus driven through them by staff and senior executives, who wish to bring their own device to work so that they can do more, work smarter and be in touch all of...
Let's face it, business units are bypassing IT and are using the likes of EC2 and Rackspace. Developers are driving this trend for the sake of agility and hindrance-free innovation. Security is not their top priority and is usually an afterthought, and this makes IT cringe. In his se...
Boston-based startup nCrypted Cloud recently launched software of the same name designed to address the security and privacy concerns that have emerged with the use of popular cloud-based storage services. Available in consumer basic, consumer pro, and enterprise editions, nCrypted ...
Implement the predictive analytic process that is designed to assess/score risk attributes during authentication so that Access Management can determine whether to require the user to complete further authentication steps. Does this sound familiar? Ann, sitting at her desk eating lun...
Symantec recently took a stroll down memory lane to revisit the first seeds of cloud computing that took hold more than a half-century ago. Symantec created an interactive timeline that illustrates the history of cloud computing, highlighting just how far the technology has progresse...
Securing your IT environment is not free, but there are new (cloud) options designed to mitigate costs while still providing a strong, manageable and proactive defense. While many companies still would rather spend capital on commodity assets, many CIOs recognize that information secur...
A number of studies I’ve recently read indicate that more enterprises will use cloud services in 2013 than ever before. This fact is not lost on many of my software vendor clients, who are transitioning many of their on-premises products into cloud-based offerings. The problem many o...
I think the new cloud killer apps for enterprises will leverage cloud-integrated data centers (or true hybrid cloud adoption), and will strategically transform IT operating models. Those killer apps will include cloud-enabled agility, protection and scalability. The public cloud has b...
Before you add another decimal place to security budgets, maybe it’s time you consider the how cloud-deployed security options can not only address the complexities of enterprise security ably, but do so at considerable savings. With all the talk of fiscal cliffs sequestrations, finan...
With cloud computing, more users and an increase in data bring with it the challenges associated with disaster recovery and business continuity. All distributed systems have to be checked and the data points must all be monitored. In working with these more complex data centers, many a...
Risk is not unique to the cloud. The "how" (aka the technology) changes, but not the mission. True professionals know the argument is not about technology or how security is delivered, but rather one of governance and policy enforcement. Do a Google search on “cloud security” and the ...
Ask not what your cloud can do for you, but what it can do for your country. The Defense Department’s IT infrastructure is on a mission of consolidation, standardization, security and access, the Defense Department’s principal deputy CIO told attendees at a recent cloud computing pane...
Recently, McKinsey & Company released an article entitled Protecting information in the cloud which discussed the increased use of cloud computing by enterprises of a variety of sizes and industries and the benefits and risks cloud usage entails. The article recognizes that many organi...
Having all the security solutions--even if they're cloud-based--doesn't necessarily ensure holistic protection. In the modern enterprise, there are simply too many parallel silos of data. The key is to get the solutions not only to talk to each other, but to leverage one another's capa...
Centrify, the ISV that makes its living leveraging Microsoft’s Active Directory, has got some new cloud-based widgetry that lets organizations centrally secure and control access to their Software-as-a-Service (SaaS) deployments. The adoption of SaaS apps combined with the Bring-Your...
“Cloud adoption has been much more prevalent in SMBs, in small office and home offices, and yet those are the individuals that don’t have the resources to secure themselves when using cloud. So Leeward was created to give assistance and practical advice to those individuals and organiz...
When eGestalt of Santa Clara, CA, announced in November they were launching a cloud-based security and compliance solution, it set the stage to change the way enterprise businesses could cope with complex compliance and security issues. The solution, powered by Rapid7 scanning technol...
Most attacks, like the recent DDoS attacks on banks, show most hackers do not use brute force to gain entry to sensitive data. And as organizations expand the perimeter of their networks,, there are so many more opportunities for data leakage and theft. To control it, a more nimble, fl...
Perhaps the only thing worse than a disaster happening is seeing it coming and knowing nothing can be done to stop it. Businesses along the northeastern seaboard had several days of warning before Hurricane Sandy struck, certainly not enough time to implement a disaster recovery plan f...
HighCloud Security, one of those rare cloud security start-ups, is warming up to its subject. A year ago when it first came to market it was focused on encryption and policy-based key management in the private cloud. It has now moved on to the public cloud in rev 2.0 of its widgetry ...
Did you know 72% of data breaches worldwide the previous year occurred at companies with 100 or fewer employees — a 63 percent increase. However, with unified security solutions, small businesses can gain enterprise-class safeguards at an affordable price. I just got off the phone wit...
It’s rather difficult to get a good read on public opinion, especially about things that half of them don’t know about. Cloud computing is one of those things. How does one get a really good view on the overall public perception of particular things? Sure, you’ve got your own persona...
Cloud computing has dramatically altered how IT infrastructure is delivered and managed, as well as how IT functionality is consumed. However, security and privacy concerns continue to be major inhibitors for risk-conscious organizations to adoption of cloud computing – whether infrast...
Many articles describe cloud security as a problem. But do you know how security affects you and your application in the cloud? In his session at the 11th International Cloud Expo, Bryan D. Payne, Director of Security Research at Nebula, will open your eyes to the various security co...
Cloud computing continues to hold a great deal of promise for a variety of business and personal implementations. A lot of buzz has been generated this year with regards to the potential of cloud-based applications and web services as well as a few recent developments that highlight th...
The Cloud Identity Buyer’s Guide discusses the issue of identity and access management (IAM) for cloud applications. It outlines the issues that need to be addressed, suggests some approaches to solving those issues and wraps up with an overview of the products from McAfee/Intel that a...
The UK Information Commissioner’s Office (ICO) recently published a useful and informative report on cloud computing that provides key guidance for companies using or considering cloud services in the UK. The guidelines intend to help organizations comply with the 1998 Data Protection ...
Last week, I covered some of the reasons data breaches happen. Let's shift gears now and look at what can be done to reduce their impact. To be perfectly clear, there’s no magic bullet for security. There are, however, a few small things that can make a big difference in every organiza...
Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely. App...
IronKey, the seven-year-old Internet security and privacy house, has changed its name to Marble Cloud in celebration of the introduction its new cloud security service. Marble is meant to protect employee-owned iOS, Android, Windows and Linux mobile devices and desktop/laptop platform...
Will cloud surveillance be the next big cloud revolution or is it just the inevitable evolution of the way 'the cloud' evolves? In his session at the 11th International Cloud Expo, Rishi Lodhia, CEO & Founder of CameraManager.com, will elaborate on the enormous business potential beh...
Data is quickly becoming one of those certainties in life, like death and taxes. It'll always be there, and like the Once-ler's Thneed factory from The Lorax (sorry, I have kids), data figures to keep on biggering, and biggering, and biggering and biggering. More data means more knowl...
The issue of Big Data seems very prevalent these days. How to store it. How to manage it. And, how to best secure it. But Big Data is much more complex than a voluminous amount of information. It requires a new paradigm in application, process, and security...all from the cloud. There...
The explosion of mobile devices in recent times has forced enterprises to tackle security issues as more employees are taking to accessing privileged company resources such as email, file servers and databases with their personal phones and tablets. An earlier report by research firm G...
Cloud adoption continues to be hampered by concerns about security and availability. Fast forward to the future where the IT landscape will support thousands of clouds that are protected in a seamless, consistent fashion. In his General Session at the 11th International Cloud Expo, S...