Mining Bitcoins in the cloud catches on

Josh Garza, the CEO of GAW Miners, first made a name for himself by building one of the top online retail stores for cryptocurrency mining equipment. Garza has pivoted that operation into the cloud by launching what he has dubbed hashlets. These hashlets are designed to create Bitcoins using a combination of ASIC (Application Specific Integrated Circuits) and cloud data center technology.

CloudWedge first reported on organizations wanting to use cloud to mint...

By CloudWedge, 10 September 2014, 0 comments. Categories: Hacking.

CSA warns PRISM is very bad news for US cloud providers

The after-effects of PRISM means that companies are much less likely to use US-based cloud service providers (CSPs), according to a survey from the Cloud Security Alliance.

56% were less likely to use US-based providers, with one in 10 going as far to say that they’d cancelled a project which used US CSPs as a result. Only 3%, interestingly, said their confidence in US vendors had increased.

It’s noticeable that, from the vendors’ perspective, their confidence had not been diminished. 64%...

By James Bourne, 25 July 2013, 1 comment. Categories: Government, Hacking, Regulation, Research, Security.

Should your private cloud use a single or a dual firewall?

Should Your Private Cloud Use a Single or a Dual Firewall?

– Brought to you by 2X Cloud Computing guest blogger Brien M. Posey –

Many private clouds are constructed in a way that allows clients to connect either locally or from the Internet. In the case of Internet connectivity, the Web Portal and Secure Client Gateway components that are used to facilitate the connection are almost always located behind a perimeter firewall. While the need for an Internet firewall is more or less undisputed, it...

By 2X Software, 12 July 2013, 0 comments. Categories: Hacking, Private, Security, Strategy.

Proactive security is required in highly regulated industries

Andrew Kellett, Principal Analyst, Infrastructure and SecurityMaintaining security that meets the risk and compliance requirements of the enterprise is a constant challenge. Systems and networks are becoming more open and accessible, but at the same time, threats have become more advanced, persistent, and complex. This is a particularly important issue in highly regulated markets such as financial services, where failure to protect sensitive information will have a negative effect on the business and how it is...

By Ovum StraightTalk, 22 April 2013, 0 comments. Categories: Analytics, Architecture, Enterprise, Hacking, Infrastructure, Security.

Cloud security: From hacking the mainframe to protecting identity

By Andi Mann, Vice President, Strategic Solutions at CA

Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.

To understand how recent trends are shifting security, let’s revisit the golden age of

By GreenPages Technology Solutions, 12 April 2013, 0 comments. Categories: Hacking, Security, Strategy.

Fears of cloud insecurity “should not drive infrastructure decisions”

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

By James Bourne, 27 March 2013, 0 comments. Categories: Hacking, Infrastructure, Research, Security.

Writer’s iCloud hacked as Wozniak calls cloud “horrendous”

Apple co-founder Steve Wozniak is hardly sitting on the fence with his opinions on the cloud

Speaking after a performance of Mike Daisey’s monologue “The Agony and the Ecstasy of Steve Jobs”, Steve Wozniak was in uncompromising mood concerning his thoughts on cloud computing.

Wozniak reportedly told the packed theatre audience: “I think [cloud’s] going to be horrendous. I think there are going to be a lot of horrible problems in the next five years”.

Five years is a long time. According...

By James Bourne, 06 August 2012, 2 comments. Categories: Hacking, Security.

What security lessons can be learned from LinkedIn?

Users are making it too easy for hackers.

If we take a closer look at the 6.5 million hashed LinkedIn passwords that leaked we find a large swathe of the user population are ignoring warnings of overly simplistic and obvious passwords. Would you believe the most common word or phrase found in a 160k sampling of the list was “link”?

And would you further shake your head in disbelief that “1234” and...

By Cloud Security, 18 June 2012, 0 comments. Categories: Hacking, SaaS , Security.

Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar agrees that...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

Cloud Security Part 2: The SECRET Sauce

The key to effective cloud security is like a two-sided coin – one side is security (of course) while the other is management. Most overlook the latter, only to realize how critical management is when it’s too late and they’ve given up on the first, security.

Securing your cloud needs to offer protection that includes firewall...

By Dome9, 04 October 2011, 0 comments. Categories: Applications, Best Practice, Hacking, Monitoring, SaaS , Security, Strategy.