Blogs

BROWSE: Most Recent | Popular Tags |

Tags > cloud_security

Security firms must retool as clients move to the cloud

By Andy Oram
January 6, 2014

This should be flush times for firms selling security solutions, such as Symantec, McAfee, Trend Micro, and RSA. Front-page news about cyber attacks provides free advertising, and security capabilities swell with new techniques such as security analysis (permit me a …

The Delusion of Private Cloud Security

The Delusion of Private Cloud Security
By George Reese
August 7, 2010

The perennial debate on private cloud vs. public cloud continues to flare up anywhere cloud computing is being discussed. One of the most often repeated myths favoring private cloud deployments is that they are "more secure" than public clouds. It's complete nonsense.

The Sacred Barrier

The Sacred Barrier
By George Reese
February 25, 2010

Should public cloud providers reach into the guest operating system to perform various functions? I've always held that a public cloud provider should treat the border between the hypervisor and guest operating system as a sacred barrier that should never be breached. The fear in public cloud computing is giving up control. When a public cloud provider reaches into your virtual machine, you lose too much control.

How Much Is the Fear of Cloud Security Worth?

How Much Is the Fear of Cloud Security Worth?
By George Reese
February 21, 2010

It's absurd to talk about the cloud as being "more secure" or "less secure" than an internal data center. In fact, for most needs, a cloud infrastructure can be secured appropriately to an organization's risk profile. Even if you are concerned about the security issues with cloud computing, it's highly unlikely those concerns justify the extra costs associated with internal data centers and managed service providers over the cloud.

Key Management in the Cloud

By Tim Mather
January 7, 2010

Cryptographic key management in the enterprise today is broken. It is a failed model of proprietary 'solutions' that is not effective, nor is it scalable. If we expect key manage-ment to work in the cloud, then we need a new...


1 to 5 of 5
The Watering Hole