Welcome!


Latest Blogs from Cloud Security
I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates t...
Blue Box, a Seattle-based provider of on-demand private cloud as a service (PCaaS) solutions, has completed its Series B financing, first announced on October 15, 2014, bringing the total financing of this round to $14 million. The round was completed with the addition of one of the n...
A little while back, we blogged on key performance metrics that top Operations teams track. Mean time to resolution (MTTR) was one of those metrics. It’s the time between failure & recovery from failure, and it’s directly linked to your uptime. MTTR is a great metric to track; however,...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...
Learn about the relationship between business risks and Continuous Testing, misperceptions about Continuous Testing, and how it helps both business and technical managers to make better trade-off decisions between release scope, time, and quality. Stickyminds' Cameron Philipp-Edmonds...
I'll explain the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid. A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people...
Increased Security: Perhaps the most controversial benefit of SDS is that it offers increased security. Hardware enthusiasts will argue that there is nothing stronger than the sticks and bricks of the physical data center and the metal of the hardware devices. But this is not necessari...
Much of what human beings experience as commonplace today - social networking, on-line gaming, mobile and wearable computing -- was impossible a decade ago. One thing is certain: we're going to see even more impressive advances in the next few years. However, this will be the result of...
When asked how companies can protect themselves, Schmidt says “They need to properly scope encryption [and] use encryption where it is available.” According to another expert, BBC.com writer Paul Rubens, “Even if cloud service providers are infiltrated or compelled to disclose data,...
There are boggling challenges on the planet, each of them affecting all of us, one way or another. Food. Clean water. Vaccinations. Health care in general. Then those second-level concerns which are also catalysts for the big problems: transportation, communications, finance. There ...
Cloud computing is increasingly becoming part of the enterprise IT landscape. In fact, a recent cloud security survey conducted by HP reveals that 70 percent of all respondents say their company is using some form of the cloud. The study also found that cloud penetration jumps to 80 pe...
By Bob Gourley The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It ...
Several current trends in cloud computing leading into 2015 actually exhibit a tension between themselves. One trend, a well-known fact that will continue in the New Year to a greater extent, is that enterprises are rapidly moving to the cloud because of its operational efficiencies. T...
Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’ doing really pretty boring jobs. Jobs like keeping software updated, tracking down holes in the firewalls, wai...
By Anup Ghosh Editor’s note: As an advisor to Invincea I closely track not only their capabilities but the context they provide the community. Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invincea blog, it is reposted below for your conside...
As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.Cloud computing adoption has matured, with...
For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
For business leaders today, it’s not enough to drive company growth, seek competitive advantages and provide vision. In this era of advanced cyberattacks, executives also need to keep their companies’ data security strategies top of mind. The Ponemon Institute’s 2014 Cost of Data Breac...
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
Successful hacks can paralyze websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organization under attack. For many, this begs the question ‘Why us?’ To find out, let’s delve into the psyche o...
For many of us in the enterprise software industry, modernizing IT while maintaining legacy systems is a tightrope walk where it pays to look ahead, stay balanced, and be nimble. As 2014 races to a close, those of us focused on terminal emulation software solutions have a responsibil...
When the Tsunami of system failures paralyzes your organization from a coordinated cyber-attack, it’s too late for the CEO to think your organization can “get through this event.” It’s too late. Too many top executives and futurists are giddy about what the future holds with the “Int...
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations? Unfortunately an increasing number of smaller companies find themselv...
Eighty-nine percent of knowledge workers retain access to the sensitive corporate applications and files of former employers. Earlier this year, a member of the team at Site-Eye, one of the top time-lapse film companies in the UK, noticed a disturbing problem with one of its client'...
The cloud has made many things simpler by allowing us to achieve economies of scale, eliminating the software installation process and enabling access of information from virtually anywhere. The list of benefits goes on, but contrary to popular belief, moving to the cloud will not make...
Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t. To avoid the complexity and cost, we recommend h...
Depending on whom you listen to, the private cloud is either dead or on the cusp of a major market breakthrough. Some tech pundits argue this technology has already been replaced by more efficient public cloud offerings and businesses just need time to catch up, while others claim ther...
The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee ...
Over the last decade, cloud computing has undeniably become a critical component of the modern enterprise. It has evolved past Software-as-a-Service for a select number of enterprise applications to encompassing entire business platforms, spanning various business devices and operating...
Operationalization (which is really hard to say, go ahead - try it a few times) is a concept that crosses the lines between trends and technologies. Both SDN and DevOps share the notion of "operationalization" as a means to achieve the goal of aligning IT with business priorities, like...
You don't necessarily get 2x the value from your logs when your volumes double. Value is more aligned with the analysis and trends you can extract from your data. It's no secret that log data is quickly becoming one of the most valuable sources of information within organizations. The...
It’s a clear message being heard across the industry - widespread adoption of cloud applications is only a matter of time. However, the tricky part for many is, how much time do organizations actually have to hold out? And why should they switch? For starters – the cost savings are cl...
Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fu...
At first glance, it might seem that the goals of DevOps and regulatory compliance are inherently at odds. Whereas much of the buzz around DevOps advocates delivering software at dizzying rates, compliance and security are concerned with proper oversight of the change management process...
The path to successful application delivery has been a long and winding road for many companies. Back in the days of Y2K and the dot-coms, applications were often delivered out of a physical data center. This usually consisted of a dedicated raised-floor room at the corporate headquart...
Despite the data privacy protections supposedly conferred by regulations like HIPAA and HITECH, consumers’ confidential health and personal information is still not safe enough. That’s the lesson to be learned from Franklin, TN-based Community Health Systems’ (CHS) August 18 regulatory...
The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms companies with advanced infrastructure that, in most cases, they could not possibly achieve in their own datacenters. In fact, According to Gartner, AWS has 5 times more ...
It is no doubt that the latest and greatest technologies get your juices flowing. Researching the details, comparing the benchmarks, imagining the differences you could make within your organization if you could just put the right technology solutions in the right place. If only budget...
Earlier in the year, Gartner forecast that by year-end 2016, more than 50 percent of global companies will have stored customer-sensitive data in a public cloud platform. These services can scale very quickly, which has made them very popular for applications that have a requirement fo...