Cloud Infographic: Dick Vs Hiro Here is a somewhat humorous take by Trend Micro on the very stark reality of cloud security and the potential vulnerabilities involved. Source: Trend Micro Cloud Solutions
Cloud Computing Canada: HP ‘Master The Cloud’ Event (Toronto) – Part 3 Continued from: Part 1 , Part 2 The HP “Mastering The Cloud” Event drew to a close around 4:30, after one last blast of hot dogs, pretzels and other salty refreshments. As someone who has attended, bought space in , and spoken at trade shows, and as an independent blogger, I would rate this one to be quite successful in terms of affirming HP’s role as an authority and credible partner in cloud management and cloud security. A key ingredient in this assessment is what I call the 4:00 “bedraggle factor,” in which most people who have spent
HP ‘Master The Cloud’ Event (Toronto) – Part 2 Here’s an interesting parallel, one somewhat removed from the busy world of cloud computing. In the world of “people,” social psychologists who specialize in generational issues are starting to refer to the most recent generation of kids coming-of-age as the Purell generation, since they are likely to be aware of every hand sanitizer bottle or station in their homes, schools, and favourite stores. This thought came to me as I observed a breakout session on cloud security at the HP Master The Cloud conference, in which the presenter discussed the principle of practicing good IT hygiene. Good IT
HP ‘Master The Cloud’ Event (Montreal) – Part 3 Continued from: Part 1 , Part 2 It had been a whirlwind day, folks. I’d like to thank Laura Mackey (@HPsoftware) for hosting us bloggers, and Rebecca Pallister (@HPenterpriseCA) for putting it all together. You two deserve a round of applause all your own. It takes a dedicated individual to greet someone so warmly that early in the morning. Good luck in Toronto and the rest of Canada with Master the Cloud 2012. Thanks also to HP and Intel, who as partners really know how to put on a good show.
Security concerns related to cloud computing Preventing data loss was stated as the main security concern overall, with 71% of respondents identifying it as one of their top three security concerns. However, preventing outages, rated second with 64%, was cited most often as the top issue, bearing out the fundamental role that ICT plays in business processes today. Large companies were much more concerned about keeping security up to date (69%) and meeting regulatory requirements (67%) than small and medium-sized companies. To help reduce security concerns overall, cloud providers need to clearly communicate their practices for maintaining a secure cloud.
Recent Cloud Computing Team Ups – II (This is the concluding part of a two-part article. For Part 1, please see: Recent Cloud Computing Team Ups) In the first part, I wrote about one recent team-up in the cloud computing space – Red Hat and SAIC. Here are two more. Piston Cloud Computing and Securisea Piston Cloud Computing, specializing in open-source cloud platform OpenStack, announced a technology partnership with Securisea, a leading Internet security consultancy specializing in cloud security and compliance. As per the terms of the agreement, Piston’s customers will have access to Securisea’s consulting and implementation services. With
Deloitte’s New Cloud Offering – CloudPrint Deloitte, the second largest professional services firm in the world (having recently lost that title to PwC), has expanded its consulting services in the cloud computing space with Deloitte CloudPrint, a “proprietary delivery framework has been designed to help guide clients through the process of becoming a cloud service provider or subscriber.” While the name of the service maybe somewhat misleading, bringing to mind offerings like Google Cloud Print, the name refers to process of printing or stamping out something rather than literal printing on paper. CloudPrint for Providers: a suite of services covering
Having an agile, mobile workforce is becoming commonplace for a lot of small and medium-sized enterprises. Remote working has been happening in corporate environment for decades, but they have whole teams dedicated to deploying infrastructures and locking them down securely. Some organizations already have solutions in place, but are they secure? How do organizations who have no remote working capability get started? Authentication For years, you’ve heard the security community harping on about having secure passwords. It’s likely you are more than familiar with advice such as, no using the names of your children/pets, no birthdays/anniversaries, use a mixture of