What Elephant in the Room? 5 Excuses to Avoid the Cloud
Is the Cloud the Next Iteration of Data Security?
Sitting in a meeting with a partner of ours, who provides cloud-based desktop and application services, I was struck by a statement by one of the company founders. He said “Yes, we provide customers with an efficient way to access their corporate data, consume application resources in the cloud, and drive down costs. But I’ve always maintained that our number one value to our customers is that we protect and secure their data.”
An interesting take, considering that the #1 concern...
Public cloud security remains MISSION IMPOSSIBLE….. for now
Cloud Security Part 2: The SECRET Sauce
Cloud Identity and Security Best Practices
Central to developing our abilities to provide Government Cloud Computing is the best practice focus area of Cloud Identity and Security.
I group these two together, both “Cloud IdAM” (
The Advent of the Privileged Cloud
What’s in a name? Well, it could be a lot. In fact, the name we assign something can have a huge impact of our perception of that thing. Would you eat reconstituted chicken parts? Thanks to whomever decided to call that a “nugget” you might.
On the other hand, sometimes we come up with a name for something that makes a great idea seem much less great. Remember New Coke? It registered quite well on blind taste tests. The problem was...
Cloud Security Part 1: Why So Many Cloud Servers are Vulnerable
Paranoia Will Destroy Ya
There’s an amusingly pugnacious post over at ZDNet by Ken Hess that asks why so many people seem to be paranoid about cloud computing.
Hess, with tongue in cheek (I think), conjures images of survivalist loonies in describing the mistrust that some of his readers apparently exhibit towards cloud. That seem like a bit much, but what with all the vendor hype surrounding cloud, I wouldn’t blame buyers for being...