Why selecting a 'safe bet' cloud vendor is critical

The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in computing history. Just look at Facebook, which grew to 500 million members in a very short period of time. People readily share within it, many with a limited understanding of the potential risks to their private information.

The ability to make an enhancement and almost instantly put it into the customer’s hands is immensely powerful...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Vendors.

Why Public Clouds are More Secure than Private Clouds

post thumbnail

Conventional wisdom would have you believe that Public Clouds are inherently insecure, and that the only way to meet your organization’s stringent security requirements in the Cloud is to implement your own Private Cloud. Conventional wisdom, you say? Unfortunately, there is precious little wisdom available of any kind when it...

By ZapThink, 08 February 2012, 1 comment. Categories: Big Data, Public, Security, Storage.

Mobile Devices in a Cloud World

Someone recently said to me, “With everything moving to the cloud, mobile device security really isn’t going to matter anymore. Sensitive data will never be stored on the device.” The thinking is that sensitive corporate data will be centrally stored and not held on mobiledevices.  And with the proliferation of 3G and 4G networking, access should be available from almost anywhere. However, this doesn’t mean that we no longer need to worry about security of the endpoint...

By GreenPages Technology Solutions, 27 January 2012, 0 comments. Categories: Security, UnifiedComms.

Microsoft addresses privacy concerns on both sides of the Atlantic

Microsoft has made its Office 365 cloud-based service more attractive to US and European customers concerned with legal issues around data sovereignty.

The company has added support for the European Commission’s “Model Clauses”, which regulate how personal data is stored even when the physical location of the data storage lays beyond the borders of the European Economic Area.

Model clauses, introduced in 2010, assure customers that appropriate steps have been taken to help safeguard personal...

By Matt Henkes, 15 December 2011, 0 comments. Categories: Compliance, Regulation, Security, Storage.

Aftershock: An online movie giant rides a “cloud” tremor

On April 21, 2011 a digital earthquake hit the United States and reverberated around the world. Online businesses rattled and hummed as they coped with a massive vibration that shook their faith in the biggest IT revolution since the Internet: Cloud Computing.

Some businesses shared the same cloud skyscrapers and all went down at once. And, there were some big names in this skyscraper including Netflix, Quora and FourSquare -- the very poster-childs for the cloud revolution.

The result is something IT...

By VI, 29 November 2011, 0 comments. Categories: Disaster Recovery, Security, Storage.

The Ins and Outs of Opting

There has been another rash of security/privacy issues by major internet companies. Actually it’s more of an ongoing issue than it is a recent outbreak. And much of the ongoing trouble is related to a poor understanding of “opt in” vs “opt out” methodologies, and some pretty poor business choices in that area.

By Arthur Hicken, 18 November 2011, 0 comments. Categories: Applications, Consumer, Security.

Inadequate IT security creates 'perfect storm for hackers'

Fears around new technologies like cloud computing, smartphones and virtualisation are central to the security concerns of many IT departments, while pressure to improve business productivity and a lack of collaboration with different business divisions is leaving enterprise IT open to increased security risks, according to a new report.

The annual ‘State of Endpoint’ study, carried out by the Poneman Institute for endpoint management and security specialist Lumension, found that the...

By Matt Henkes, 17 November 2011, 0 comments. Categories: Best Practice, Industry, Research, Security, Virtualisation.