Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
While there is much talk about how to secure data and systems in cloud computing, many gaps remain in implementing such security. As users of any physical security systems can attest, it just takes one unsecured door or window to provide easy access to an intruder and loss of valued pr...
The benefits of cloud computing are undeniable with its ability to deliver agility, elasticity, lower costs and faster time-to-market. And security concerns within the cloud can and are being fully addressed, ensuring that security breaches such as the one suffered by Sony within its v...
SYS-CON Events announced today that Imperva, the leader in data security, will exhibit at SYS-CON's 9th International Cloud Expo, which will take place on November 7–10, 2011, at the Santa Clara Convention Center in Santa Clara, CA. Imperva is a pioneer and leader of a new category of...
The Cloud Security Alliance has received a no-cost license for the CloudTrust Protocol (CTP) from CSC. The CTP is being integrated as the fourth pillar of the CSA's cloud Governance, Risk and Compliance (GRC) stack, which provides a toolkit for enterprises, cloud providers, security so...
As cloud application adoption becomes pervasive throughout the enterprise, concerns around cloud data privacy, residency, and security continue to grow. A number of enterprises are slowing, and even reversing, their cloud application adoption until they can address the concerns stemmin...
As Andy Grove would say, “Only the paranoid survive.” After Amazon went down and the general chatter suddenly became shot through with talk of availability zones and redundancy, public cloud users and people hesitating to use a public cloud started articulating another deeply held fea...
No sooner did Sony’s PlayStation and Qriocity network get back on its feet in the US and Europe, Sony was hacked again. This time it was Sony Pictures, which can be added to Sony Online Entertainment, Sony Ericsson and a Japanese ISP subsidiary. The hacker, Lulz Security, figures i...
In the wake of an attempted hack at Lockheed Martin, EMC unit RSA Security is offering to replace the two-factor SecurID authentication tokens its 40 million users use to log into their computers “securely.” Most of its users are major corporations. It’s unclear exactly what happene...
Cloud adoption offers tremendous opportunities for enterprise adopters to quickly, easily, and affordably deploy new applications without the traditional IT headaches. Unfortunately, it also presents opportunities for hackers to score sensitive information from a wide range of enterpri...
The public cloud is about more than testing and development. More and more companies are migrating production applications into the cloud. Traditional ISVs, large enterprise, manufacturers and pure web-based properties are moving to the cloud. In their session at the 8th International...
If you aren’t a complete technological Luddite, the odds are high that you have stored or worked with corporate information in some sort of cloud environment. Whether you’re using Facebook for marketing purposes or migrating the entire organization’s productivity suite to Google Apps, ...
Sony, which expected to return to profitability, figures it’s down $3.2 billion – that’s “b” as in billion – in the March quarter because the massive March 11 earthquake and tsunami crippled or curtailed its production. It’s down another $171 million because of the equally massive ha...
PerspecSys Inc. on Monday announced the closing of an $8M series A financing led by Intel Capital and including existing investors Growthworks and MaRS Investment Accelerator Fund. This funding provides capital for strategic expansion of the business and to increase its technological a...
We’ve been talking with our customers for some time about the convergence of identity, security, and storage. There are a number of factors driving this union of technologies and cloud storage provides a great case study to highlight our point of view. If you caught the recent news on...
Certeon on Thursday launched aCelera Cloud, its software cloud optimization and application acceleration solution that enables automated and secure public and private cloud interconnectivity. “Many organizations still have concerns over the security and control of their applications a...
Sony has taken down another of its cloud services. This time it’s Sony Online Entertainment (SOE), its role-playing game site. The message it sent out said, “We have had to take the SOE service down temporarily. In the course of our investigation into the intrusion into our systems...
Cloud computing represents today’s big innovation trend in the information technology (IT) space. Because it allows enterprises to deploy quickly, move swiftly, and share resources, cloud computing is rapidly replacing conventional in-house facilities at enterprises of all sizes. Unf...
The Cloud Security Alliance (CSA) is supposed to have a key role in developing cloud security and privacy standards under ISO/IEC (International Organization for Standardization/International Electrotechnical Commission). The CSA has established what’s called a Category C liaison relat...
As more and more services and applications go to the cloud, it becomes imperative that organizations gain a greater visibility into what those IT assets are doing. This imperative is being driven by a raft of new regulations and industry mandates, whose enforcement is continually being...
SYS-CON Events announced today that Virtela, the world's largest independent managed network, security and cloud services company, has been named “Bronze Sponsor” of SYS-CON's 8th International Cloud Expo, which will take place on June 6-9, 2011, at the Javits Center in New York, New Y...
SYS-CON Events announced today that FireHost, the leading secure, managed hosting provider, will exhibit at SYS-CON's 8th International Cloud Expo, which will take place on June 6–9, 2011, at the Javits Center in New York City, New York. FireHost, Inc. is a Dallas, Texas-based secure ...
Security is moving to Trust Management and the Cloud is going to make it happen. In a connected world, security is morphing quickly and we are no longer focused on disconnected servers, objects and things. In his session at the 8th International Cloud Expo, Scott Chasin, CTO McAfee C...
One of the biggest concerns for enterprises considering public cloud services is the notion that they are inherently unsecure. Many cloud implementations treat security as an afterthought - layering it on top of the virtualization server. A more secure solution is a "multi-layer approa...
Symplified announced on Tuesday that it has joined the Cloud Security Alliance (CSA). The CSA is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help s...
With Gartner predicting $150 billion in cloud-related revenues by 2013, the march towards “the cloud” is not abating. As the market grows, “Is the cloud secure?” is a very familiar refrain frequently asked by corporate management. While those in IT will certainly tell you no environmen...
Every aggregation industry in the world involves risk transfer and substantial (in the billions) insurance markets for catastrophic financial or legal events - except for cloud computing. Traditional industries that leverage insurance markets range from banking to property to energy to...
In the fall of 2010, Trusted Computing Group announced the Trusted Multi-tenant Infrastructure (TMI) Work Group to address cloud computing security and the role of trust in that security. Last week, the work group released the first in a series of use cases (http://www.trustedcomputing...
SYS-CON Events announced today that Crossbeam Systems, the leading provider of next-generation security platforms for high-performance networks, will exhibit at SYS-CON's 8th International Cloud Expo, which will take place on June 6–9, 2011, at the Javits Center in New York City, New Y...
SafeNet has launched its Trusted Cloud Fabric. It’s a practical framework designed to deliver trust, security, and compliance to enterprises moving data, applications and systems to the cloud. As part of this framework, SafeNet will also be releasing three new cloud-based solutions: Pr...
SYS-CON Events announced today that Vyatta, the leader in software-based networking for physical, virtual and cloud infrastructures, will exhibit at SYS-CON's 8th International Cloud Expo, which will take place on June 6–9, 2011, at the Javits Center in New York City, New York. The Vy...
“Large enterprises, government and small businesses need assurance that shared services in the cloud are secure, and these users must have trust in the confidentiality, integrity and availability of business-critical services,” noted Erik Visnyak, TCG Trusted Multi-Tenant Infrastructur...
Thales and Layer 7 Technologies plan to integrate the Thales nShield family of Hardware Security Modules (HSMs) within Layer 7 Gateways to provide Layer 7’s customers with new levels of security whenever they encrypt or digitally sign sensitive data to be shared across security boundar...
The main integration barrier lies in cross-company business integration due to the lack of secure communication models. Medium and large organizations that do business with one another and need to exchange information about individuals' identities (for example, an airline and a renta...
As enterprises struggle to remain profitable in an ever-changing risk environment, the current economic crisis has elevated the need for effective business risk management. Information security is a key parameter that affects business risk. The academic definition of information securi...
How should a company evaluate its own risk profile? What questions do you need to ask your Cloud services provider? How about the whole idea of transferring risk and indemnity? In his session at the 8th International Cloud Expo, Steve Riley, Technical Leader in the Office of the CTO...
Gazzang, a cloud infrastructure software company, has entered the Cloud Tools Program with Rackspace Hosting. It will provide management solutions that help secure MySQL databases hosted on The Rackspace Cloud, and accelerate enterprise adoption of public, private and hybrid cloud envi...
The RSA Conference "Where the world talks security" scheduled for February 14-18, 2011 in San Francisco, CA has an enhanced focus on Cloud Computing this year. Speakers & vendors alike will be discussing new products that help companies secure private, public and connected Clouds. A ...
Orange Business Services has joined the Cloud Security Alliance (CSA) as a corporate member to lend its global expertise to promoting best practices for security within cloud computing. As a corporate member of the alliance, Orange Business Services will participate in the solution pr...
A year-old Silicon Valley SaaS start-up called CloudPassages broke cover Wednesday claiming that it can do what other security companies have failed to do and that’s protect elastic cloud servers. It’ll get off the ground by offering its base technology for free. The company’s purp...
North American businesses are collectively losing $26.5 billion in revenue each year as a result of slow recovery from IT system downtime according to a recent study. The study also indicates that the average respondent suffers 10 hours of IT downtime a year and an additional 7.5 hours...