Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
A couple of quick thoughts here, mostly around the changing scale of the task of securing information in the cloud. I think we see a couple of interesting trends here and they are, well, not necessarily complementary. The first is that the cloud providers are getting serious about scaling their ope ...
Posted 11 March 2011 by Geoff Webb
1
comment
Cloud Security: The Identity Factor
By Patrick Harding The Problem with Passwords The average enterprise employee uses 12 userid/password pairs for accessing the many applications required to perform his or her job (Osterman Research 2009). It is unreasonable to expect anyone to create, regularly change (also a prudent security prac ...
Posted 10 March 2011 by Cloud Security Alliance (CSA)
1
comment
By Chris Wysopal Developers and IT departments are being told they need to move applications to the cloud and are often left on their own to navigate the challenges related to developing and managing the security of applications in those environments. Because no one should have to fly blind throug ...
Posted 08 March 2011 by Cloud Security Alliance (CSA)
1
comment
Keeping Control in the Cloud
I had a great talk with Fred Donovan this week regarding cloud security. It's pretty clear that organizations of all kinds are very concerned about the risks (and the cost of those risks) when moving to adopt cloud services.  It's also fair to say that the cloud providers are working diligentl ...
Posted 04 March 2011 by Geoff Webb
0
comments
Trusted Client to Cloud Access
By Vikas Jain Cloud computing has become an integral part of all IT decision making today across industries and geographies. This market is growing at a rapid pace. By 2014, IDC expects public cloud spending to rise to $29.5 billion growing at 21.6%  per year. At the same time, Forrester predi ...
Posted 02 March 2011 by Cloud Security Alliance (CSA)
1
comment
  Increased use of public WiFi access at hotspots, retail stores, hotels and other similar establishments has recently motivated New York Democrat, Sen. Charles Schumer, to call on major US website operators – including Amazon and Twitter – to switch to secure protocol (HTTPS) ...
Posted 28 February 2011 by Ajay Gupta
0
comments
By Allen Allison Disaster Recovery (DR) and Business Continuity Planning (BCP) continue to be driving factors for some organizations looking to move to the cloud. Many are looking to manage their Disaster Recovery planning through extensive use of managed cloud services – and for good reasons ...
Posted 23 February 2011 by Cloud Security Alliance (CSA)
0
comments
By Ian Huynh Cloud computing has become an integrated part of IT strategy for companies in every sector of our economy. By 2012, IDC predicts that IT spending on cloud services will grow almost threefold, to $42 billion. So it’s no surprise that decision makers no longer wonder “if ...
Posted 23 February 2011 by Cloud Security Alliance (CSA)
2
comments
Cloud, here we come!
Cloud, here we come!  Or is it rather more a case of "We're already here, so make the best of it..."? I spent some time today talking to a good friend of mine who also happens to be the head of security for a large European financial services business. Unsurprisingly we got on to the ...
Posted 11 February 2011 by Geoff Webb
0
comments
Quit Worrying About Cloud Security?
Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as it seems to be sometimes. I stumbled across the following article: Why you can quit worrying about cloud security (thank you Jim), which makes a lot of interesting statements on how the US Federal Gov ...
Posted 04 February 2011 by Roger Halbheer
0
comments
 By Mark O’Neill In this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage Cloud services. In fact, an organization accessing Cloud-based services without Single ...
Posted 01 February 2011 by Cloud Security Alliance (CSA)
4
comments
Dining in the Cloud
I enjoyed Matthew Gardener's blog this week on the potential for the re-emergence of security silos as a result of the growing move out into the cloud. I think he's right, of course.  If you think of the emeregence of any number of technologies, from desktop computing, through client-server, t ...
Posted 28 January 2011 by Geoff Webb
0
comments
Building a Secure Future in the Cloud
By Mark Bregman Cloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing – please excuse the pun – is often cloudy. With cloud computing, IT resources can scale almost immediately in response to business needs and can be deliv ...
Posted 27 January 2011 by Cloud Security Alliance (CSA)
1
comment
I-Coverage
I wanted to comment a little on the recent stir concerning the vulnerabilities on the iPhone (iPad, iTouch, I-Robot.  No, wait, that's a movie.) I think the level of interest in this vulnerability (and there's been a lot on security blogs in the past couple of days) speaks volumes about the gr ...
Posted 13 August 2010 by Geoff Webb
0
comments
It's all about WHO
“I KEEP six honest serving-men  (They taught me all I knew); Their names are What and Why and When  And How and Where and Who.” – Rudyard Kipling As I look at the sorts of problems that even the largest, most mature organizations are dealing with, many times I ...
Posted 08 July 2010 by Geoff Webb
0
comments
Who's On First?
It’s hard not to love Abbott and Costello. The“Who’s on first” routine has become a staple of Americana even for foreign transplants like me. But if figuring out the identity of who is on second base (no, wait, that’s What on second, right?) is so hard when we’re ...
Posted 18 June 2010 by Geoff Webb
1
comment
Outsourcing Insider Attack?
I know one or two other bloggers have spotted the following news piece too, notably Bruce Schneier, but it’s hard to pass up an opportunity to not only comment, but to draw some wider parallels with other market trends in IT. The BBC reported a few days ago that the good folks at Charlapally C ...
Posted 20 May 2010 by Geoff Webb
0
comments
Practical working Security Policies
Effective working policies are a very difficult thing to achieve, whether they are security policies, or any other policies. We've all seen them in our own organisations, employment policies contradict security policies, or ethical policies contradict investment policies, etc. etc. The school our c ...
Posted 03 December 2009 by Sarb Sembhi
0
comments
Security and Usability
It is not a new concept: The secure way is only secure if it is the easiest way. I have seen a lot of solutions which are extremely secure – in the eyes of the security people. However, the users find a lot of ways to circumvent the security measures because they are too complex to fulfill th ...
Posted 26 November 2009 by Roger Halbheer
2
comments
Board Level Security Metrics
Last week I attended the Infosecurity Council and had the previlege of spending some time with many security leaders, and I always find these meeting very interesting, as Iwill always learn something that I didn't know before. This meeting was no exception, before the meeting started, I was cha ...
Posted 23 November 2009 by Sarb Sembhi
Showing 61 - 80 of 80 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×