Whitepaper: Big Security For Big Data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for intelligence. Data explosion The multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations need a way to protect, utilize, and gain real-time insight from “big
Cloud Computing Contracts “The universe never did make sense; I suspect it was built on government contract.” – Robert A. Heinlein (1907-1988), American science fiction writer. A contract is defined as “a legally enforceable agreement between two or more parties for the doing or not doing of something specified.” Contracts are the cornerstones of business. Unfortunately, for cloud computing, contracts are still a grey area that has the potential for causing serious problems. In some of my previous articles, I had mentioned how lack of clarity of contracts is holding back widespread adoption of cloud computing. A lot of the
Last week I wrote about the RSA Conference currently on in San Francisco and what it meant for cloud security (See: Can The RSA Conference Help Dispel Cloud Computing Security Fears? ). Today’s article is an update on what’s happening in “The City by the Bay.” For one, cloud computing is high on the agenda at the conference, so much so that there is a Cloud Security Alliance (CSA) Summit on the schedule. I had touched on the CSA in an earlier article (See: Big 4 Auditing Firm Ernst & Young Joins Cloud Security Alliance) and there’s no doubt that
WikiLeaks and the Cloud DDOS Strategy I found the recent WikiLeaks saga to be fascinating. Never in history has the individual had so much power to collate and distribution sensitive information, with the ability to embarrass governments around the world and put them into damage control. But for a cloud computing vendor like myself, this story added an interesting twist. Within hours of releasing documents, the WikiLeaks servers were under heavy attack from patriotic individuals, and likely also governments, trying to stem the flow of information. It was a typical distributed denial of service (DDOS) attack, which can usually shut-down an
Amazon Cloud Host stops hosting WikiLeaks site (Reuters) – Amazon.com Inc has stopped hosting WikiLeaks’ website, which posted thousands of classified U.S. government documents this week, U.S. Senate Homeland Security Committee Chairman Joe Lieberman said on Wednesday. The move comes after Lieberman’s staff made inquiries to Amazon on Tuesday as reports surfaced that WikiLeaks had asked Amazon to host its website on the Amazon servers after hackers targeted the WikiLeaks site. A representative for Amazon was not immediately available for comment.