Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
SMB cloud adoption is critical for growth of most cloud vendors, but the SMB market is typically ill-prepared for some of the nastiness the sophisticated attackers in Russia and Asia are throwing at them, like ransoming their sites with DDoS, draining bank accounts with ZEUS, and more....
Earlier this week, the Massachusetts Eye and Ear Infirmary and Massachusetts Ear and Eye, Inc. (MEEI) agreed to pay a hefty $1.5 million settlement to the U.S. Department of Health & Human Services for alleged HIPAA violations. According to MEEI, a personal laptop that contained unencr...
When it comes to the cloud, there is a great deal of misconception. If it looks like a duck and quacks like a duck, does that make your application or service truly cloud-based? No. If it doesn’t have the proper “cloud DNA,” it means the end user organization is not realizing the oft-h...
Driven by large-scale government initiatives as well as private investment, cloud computing has become a hot growth area in China. Named a ‘Strategic Emerging Industry’ in the government’s 12th Five Year Plan (2011 – 2015), cloud computing is slated to become a primary force in the Chi...
As cloud computing technologies and offerings mature and evolve in its services to customers, one common consumer use will be that of the Software as a Service (SaaS) model. My earlier articles have touched on the various models, risks, security and forensics at several levels. There ...
Information Security and Risk has become a top concern of IT organizations and consumers alike. Concern about inadequate Info Security remains the #1 obstacle to greater adoption of Cloud Computing, according to Intel’s research. The rapid growth of Mobile and IP-connected Embedded dev...
Gartner recently issued a research note on “Cloud-Based Security Services,” the capability to deliver security controls without on-premise technology deployment and management. The category currently sits in the “Trough of Disillusionment” in the latest Gartner Hype Cycle for Cloud Sec...
Gartner recently published a report that highlights the growing importance of Cloud Access Security Brokers – solution providers that offer unified cloud security platforms. This solution category includes a new class of products that Gartner terms Cloud Encryption Gateways, which encr...
There are a few absolutes when it comes to school. First, lunches will always be terrible. Second, your locker will be too small to fit your oversized textbooks. Finally, there's a high likelihood that some of your student data will be stored in the cloud. This student data includes...
We are witnessing the large-scale industrialization of the data center, owned and operated by the ICT operators who specialize in that task, with security technologies in the hands of the end user to remove any need to trust their human operators. The traditional “protect the perimete...
Gartner recently published a report that highlights a trend that we have been experiencing over the past few years, namely, the growing number of enterprises wrestling with cloud data security, cloud compliance, and cloud data residency issues associated with storing and processing sen...
Symform on Thursday announced it has joined the Cloud Security Alliance (CSA). The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within cloud computing, and to provide education on the uses of cloud computing t...
Despite widespread concerns about cloud data security and control, there’s been a lot of recent news on the healthcare industry’s steady, but cautious foray into cloud computing. In early July, research firm MarketsandMarkets issued a report stating that the healthcare cloud computing ...
Virtustream and SafeNet on Tuesday announced that they have entered into an agreement that will incorporate SafeNet’s market-leading authentication solutions into Virtustream’s enterprise cloud platform, xStream. “Enterprises looking to deploy the cloud want both enterprise-grade perf...
The huge growth in mobile technologies and new free collaboration services (e.g. Dropbox) is forcing organizations to find ways to coexist with these technologies, taking advantage of the efficiencies they bring, and ensuring that their data assets are adequately protected. Organizatio...
Cloud security is in a state of flux. Actually it’s not really, but discussion is rife across the industry regarding the general state of cloud data and application welfare. Questions flutter around whether particular services are secure, whether multi-tenant clouds can be locked down ...
“One of the greatest challenges to security in the cloud is management,” noted David Meizlik, Vice President of Marketing at Dome9 Security, in this exclusive Q&A with Cloud Expo Conference Chair Jeremy Geelan. “With cloud computing,” Meizlik explained, “the infrastructure is owned and...
According to “The State of Adoption of Cloud Applications” a recent survey from Tata Consultancy Services (TCS) determined that overcoming the fear of security risks remains the key to adopting and benefiting from cloud applications. In addition it found that while companies globally a...
I’ve received a lot of questions lately about security in the Cloud and what CTOs should be considering when they are evaluating it. Here’s my advice, treat the Cloud like an extension of your corporate or production network, don’t treat it or hold it to a lower standard assuming that ...
SYS-CON Events announced today that Cloud Security Alliance has been named “Association Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. The Cloud Security Alliance (CSA) is a not...
Appcore announced on Tuesday that continuityX, a provider of business continuity, disaster recovery and managed network services to medium-to-large scale enterprise businesses, has selected them as their primary provider to deliver cloud-based disaster recovery and application services...
Virtustream wants to move mission-critical legacy apps to the cloud where they’ll be 60% cheaper to run on-demand especially since they won’t have to be rewritten. So it’s put out xStream 2.0, an update, which is supposed to move both web-scale applications and legacy applications to...
McAfee, the world’s largest dedicated security technology company continues to extend its security leadership to the Cloud with new enhancements to its security platform for the Cloud. The McAfee Cloud Security Platform provides a framework that allows organizations to extend their sec...
Cloud Security has been one of the top challenges reported by organizations that want to migrate to the Cloud. This is a challenge since the organization’s data may now be stored externally that can pose greater challenges to data integrity and compliance. Even though the data may be i...
Many organizations have embraced, or are considering, the benefits of cloud computing – speed, flexibility, increased expertise, shared workload, reduced costs, etc. The benefits are many – but so are the risks. What are the threats to cloud security? Which parties assume responsibilit...
The need for Encrypting data that is stored on public cloud platform is fully realized by enterprises, as it has got direct legal implications and the credibility of the organisation at stake. As mentioned we may have multiple options like either using specialized middlewa...
As an exhibitor at Cloud Expo New York, Dome9 Security is offering special passes to SYS-CON's 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York. Dome9 Security, the leader in cloud security management, automates ...
SYS-CON Events announced today that PerspecSys Inc., the leader in cloud data protection solutions for the enterprise, has been named “Silver Sponsor” of SYS-CON's 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York....
Security concerns are the biggest thing holding back cloud adoption, but Intel says it’ll take it and its pricey $7.68 billion McAfee acquisition at least another five years to bring cloud security up to the best-in-class traditional enterprise security available now. Not very reassu...
“We are very pleased to build the next generation of secure cloud computing with HP Cloud Services, and to be the first vendor to manage HP Cloud Security Group policies leveraging the OpenStack API,” commented Dave Meizlik, Dome9 VP of Marketing and Business Development, as Dome9 Secu...
Information Security and Risk has become a top concern of IT organizations and consumers alike. Concern about inadequate Info Security remains the #1 obstacle to greater adoption of Cloud Computing, according to Intel’s research. The rapid growth of Mobile and IP-connected Embedded dev...
In today’s business world, data is the lifeblood of most organizations. As such, it has become a prime target for both external and internal threats. Data breaches made plenty of headlines in 2011 and don’t show any signs of slowing down. In fact, a recent report from Privacy Rights Cl...
In the early years of cloud computing, the idea was just to get there – to start achieving some of the promised efficiencies. But now, as cloud initiatives mature, the focus has turned to ensuring data security and privacy – no small feat, given the range of threats and global regulati...
If you work in information technology and you passed through the city of London over the last week it would have been hard not to notice the InfoSec IT security conference being held at the Earl’s Court exhibition center. Logically, of course, certain themes and trends came out of th...
Today, security is undoubtedly the biggest risk and negative side effect to cloud computing. Fortunately, the status quo is about to change. The Trusted Computing Group (TCG), a not-for-profit organization that has developed open standards for computers, networks, storage and mobile de...
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. Guide describes security architecture capabilities, common business use cases, and deployment considerations....
VMware has confirmed that one of its ESX hypervisor source code files was posted online. Iain Mulholland, director of VMware’s Security Response Center, posted the following event-minimizing message: “Yesterday, April 23, 2012, our security team became aware of the public posting of...
“Our new instant access app for Google Chrome makes it unbelievably easy to get secure access to any server, on-the-fly,” said Zohar Alon, Co-Founder and CEO of Dome9 Security, which announced on Wednesday the availability of Dome9 Instant Access for Google Chrome, a new browser-based ...
With cloud comes the notion of liberation. Cloud is the natural evolution of the data center. It’s easy to deploy, infinitely scalable, and highly redundant. It is the shiny new component inside the storage controller and is making it possible for an old dog to learn some very impressi...
Today, with enterprises migrating to the cloud, the security challenge around protecting data is greater than ever before. Keeping data private and secure has always been a business imperative. But for many companies and organizations, it has also become a compliance requirement and a ...