Fears of cloud insecurity “should not drive infrastructure decisions”

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

By James Bourne, 27 March 2013, 0 comments. Categories: Hacking, Infrastructure, Research, Security.

Is BYOD the cloud evangelist’s worst nightmare?

For three in four IT security professionals, bring your own device (BYOD) is one of the “greatest inhibitors to effective cloud security”.

That’s the result from a new report by AccelOps. Talking to 176 IT security personnel, the results put BYOD ahead of data control and data loss – traditional topics for cloud security worriers – as the main security threat.

Other cloud security pain points according to the research included enforcing security policies, compliance reporting and employee...

By James Bourne, 22 March 2013, 0 comments. Categories: Applications, Enterprise, Security.

Vapour vs bricks: Why the cloud could be the safest place for your data

By Justin Fielder, Easynet Chief Technology Officer

If I was to suggest businesses move IT services to the cloud to improve security, there’s a strong possibility I would be laughed out of town. Despite businesses clearly seeing the benefits of migrating to the cloud, research shows that, for 61% of European CIOs, security is still the biggest concern when considering such a move.

For many network professionals, there is a clear comfort factor which derives from having a virtual boundary fence built...

By Easynet G.S., 21 March 2013, 1 comment. Categories: Big Data, Disaster Recovery, Enterprise, Security.

Who’s the number one cloud computing nation?

The BSA has put together a report which ranks the top 20 countries worldwide in terms of cloud readiness, and it may not be a surprise as to which nation is at the summit...

Japan is the highest ranked cloud computing nation worldwide, according to research published by BSA: Software Alliance.

In its 2013 BSA Global Cloud Computing Scorecard, the Alliance aims to “provide a platform for discussion between policymakers and providers of cloud offerings, with a view toward developing an internationally...

By James Bourne, 20 March 2013, 1 comment. Categories: Industry, Research, Security, Trends.

Soto: “Cloud does not absolve anyone from common sense IT”

CloudTech speaks with Juan Carlos Soto, Informatica senior vice president, cloud evangelist and member of the TechAmerica Foundation’s US Deployment of the Cloud, about iPaaS, SLAs and keeping secure in the cloud.

The difficulties around cloud security may be improving, but users don’t help themselves if they’re not street smart about their IT usage.

That’s according to Informatica senior vice president Juan Carlos Soto, who said that cloud computing shouldn’t “absolve...

By James Bourne, 15 March 2013, 0 comments. Categories: Big Data, PaaS, Security, SLA.

The death of the enterprise boundary and the evolution of edge security

Across the globe, organisations in all industries are facing the increasingly complex job to control the security and privacy of their data – wherever, however and whenever it is accessed. In one way or another, this has always been a challenge for enterprises.

However, as big data, cloud services, mobile tech and social networks converge in the enterprise space, organisations today are under greater pressure than ever before to keep up with the impact this is having on security.

Staying on top of changing...

By John Thielens, 15 March 2013, 0 comments. Categories: Big Data, Enterprise, Security.

3 reasons to embrace the private cloud

For everything cloud computing offers – speed, convenience, simplicity, offsite backups – its “public” nature remains a touchy subject for enterprise.

This simple fact explains why many organisations have been slow to embrace the cloud. In business, data security is everything. And for decision makers at big firms, trusting all mission-critical data into the care of a third-party IT vendor sounds just a bit too risky.

But with the arrival of the private cloud, organizations can enjoy...

By Aidan Grayson, 08 March 2013, 0 comments. Categories: Big Data, Enterprise, Private, SaaS , Security.

10 things to think about when moving to the cloud

Moving applications to the cloud can create a more flexible, more responsive IT department, but what about moving application data to the cloud? How secure is that? And are cloud applications truly reliable and less expensive than on-premise applications?

Let’s consider some issues before you take the cloud-migration leap.

1. Goals Are you moving to the cloud to reduce costs, time-to-deployment, or your IT department’s workload? Goals are the foundation of success, so you should...

By Paul Moxon, 07 March 2013, 1 comment. Categories: Disaster Recovery, Monitoring, Security.

CSA: What are 2013’s top cloud security threats?

The Cloud Security Alliance (CSA) has released a new report designed to examine the most pervasive security threats still threatening cloud in 2013.

Called “The Notorious Nine” – presumably using the same nomenclature that Enid Blyton employed for the protagonists of her fabled children’s books – the CSA enlisted the help of industry experts, and is designed to be used in conjunction with other CSA best practice guides; “Security Guidance for Critical Areas in Cloud...

By James Bourne, 04 March 2013, 0 comments. Categories: Best Practice, Big Data, Disaster Recovery, Security.

Analysing the evolution of single sign-on

Replacing mainframes with 21st century identity

By Paul Madsen, senior technical architect

The concept of single sign-on (SSO) is not a new one, and over the years it has successfully bridged the gap between security and productivity for organizations all over the globe.

Allowing users to authenticate once to gain access to enterprise applications improves access security and user productivity by reducing the need for passwords.

In the days of...

By cloudbestpractices.net, 19 February 2013, 0 comments. Categories: Enterprise, SaaS , Security.

Personal cloud usage influences company adoption, says CDW

CDW report looks at the health of cloud computing in terms of drivers, barriers and cost and says that ‘work imitates life’ with cloud adoption

It’s that time of the year again; companies have stopped predicting what the cloud is going to look like for 2013, with organisations instead concentrating on what the ecosystem is currently looking like.

CDW is a case in point. The IT product supplier has issued its ‘2013 State of the Cloud’ report, surveying 1,242 tech professionals,...

By James Bourne, 18 February 2013, 0 comments. Categories: Adoption, Enterprise, Migration, Research, Security.

Companies afraid to move to the cloud because of government snooping

Cloud security is once again on the agenda after a report from Lieberman Research showed that nearly half of IT professionals were wary of keeping sensitive data in the cloud due to government intervention.

The survey was conducted at November’s Cloud Security Alliance (CSA) Congress and found that the majority of respondents prefer to keep their most sensitive data on private networks rather than on the cloud.

Other top-line findings were:

  • Nearly nine in 10 (88%) of IT professionals believe some cloudy data could be lost, stolen or corrupted
  • Less than...

By James Bourne, 15 February 2013, 1 comment. Categories: Adoption, Government, Migration, Security.

5 reasons VPNs suck in the cloud

VPNs-Suck-in-the-Cloud-LargeIf you’ve been around the block a few times, you’re probably wondering why the title of this post isn’t, 50 Reasons VPNs Suck in the Cloud. VPNs have long been the bane of both administrators and users (and lets not forget, support). They’re clunky, complex, and costly, and the same is true when they’re deployed to secure cloud access. Today, VPNs are increasingly used to connect to cloud computing resources. Either by...

By Dome9, 15 February 2013, 0 comments. Categories: Infrastructure, Private, Scalability, Security.

Firewalls in the cloud era: They improve the cloud and the cloud improves them

Firewalls will always be required as they are the sole devices that analyse and control communication of data and applications.

Firewall technology ensures networks are running the way we want them to.  As a result I came to the conclusion that the question is not ‘will on-premise firewalls disappear’, but ‘how will firewalls be influenced by cloud technologies?’.

In order to address this we have to look at some of the history.

Enter Unified Threat Management

10 years ago the...

By Wieland Alge, 13 February 2013, 0 comments. Categories: Architecture, Security.

New Zealand commissioner offers cloudy advice for SMEs

The New Zealand Privacy Commissioner, Marie Shroff, has released a document discussing data and security implications for companies moving to the cloud.

Even though the report looks at the relative basics of cloud computing from an enterprise perspective, the guidelines it recommends still make interesting reading.

The key tenet from the research was that nobody else except the user is ultimately responsible for the information they put in the cloud. “If there’s a privacy breach, you’re...

By James Bourne, 12 February 2013, 0 comments. Categories: Research, Security.

How "policy as a service" is critical for cloud deployments

The financial ROI of cloud security and compliance is judged by decision makers in end-user organisations by the same measures as is done for Cloud computing in general, i.e. by how much it cuts up-front capital expenditure and in-house manual maintenance cost. However, manually translating security policy into technical implementation is difficult, expensive, and error-prone (esp. for the application layer). In order to reduce security related manual maintenance cost at the end-user organisation, security tools need to become more automated. With the emergence of cloud PaaS, it is therefore logical to move all or parts of the model-driven...

By cloudbestpractices.net, 08 February 2013, 0 comments. Categories: Infrastructure, PaaS, Security.

5 biggest mistakes admins make with cloud firewalls

firewall-dome9The cloud can be a great investment for most organisations. It offers the promise to significantly increase capacity and agility, while simultaneously reducing costs. Companies invest significant resource to attain a great ROI in the cloud, but if that investment isn’t secured, migrating could turn out to be a disaster. Most cloud adopters underestimate the philosophical and technological change required to security when migrating to the cloud. It’s a problem that affects...

By Dome9, 07 February 2013, 0 comments. Categories: Migration, Security.

Can your business stay secure in the cloud?

Cloud security is not a paradox!

 “Is cloud computing secure?” A question that has been asked since the dawn of “the cloud” and the answer has been debated many times over. Cloud security has been a long, never-ending discussion and more often than not evidence shows businesses rarely regret taking the plunge into a cloud infrastructure.

Despite the misconception that the cloud is entirely unprotected, there has still been a phenomenal growth in the cloud market in recent years....

By maildistiller, 07 February 2013, 0 comments. Categories: Infrastructure, Security.

New cyber threats within the internet of everything

Cisco released findings from two global studies that provide a vivid picture of the rising security challenges that businesses, IT departments and individuals face -- particularly as employees become more mobile, blending work and personal lifestyles throughout their waking hours. Despite popular assumptions that security risks increase as a person's online activity becomes shadier, findings from the Cisco 2013 Annual Security Report (ASR) reveal that the highest concentration of online security threats tend to target legitimate destinations visited by...

By David H Deans, 04 February 2013, 0 comments. Categories: Security.