Cloud Security

Businesses assured they can trust cloud computing

Grazed from Experian QAS.  Author: James Glass.

Businesses and public sector bodies can put their faith in cloud computing, an industry expert has insisted.

Art Coviello, chief executive of data security firm RSA, insisted it is possible to use virtualisation to make the cloud a safer place, although he acknowledged this may at first appear to be "counter-intuitive".

He went on to state the importance of businesses putting security measures in place, explaining: "We now know a criminal ecosystem has developed.

iPad security and the cloud

Grazed from ComputerWorld.  Author: Gregory Machler.

I was at the airport, standing in line, when I struck up a conversation with a traveller about his iPhone. He discussed its features with me and its ability to harness the internet anytime and anywhere. He indicated that the phone's simple, elegant, and intuitive interface is a joy.

Security, mobile and cloud hit Singapore IT courses

Grazed from ZDNet.  Author: Jamie Yap.

The School of Informatics and IT (IIT) at Temasek Polytechnic (TP), for example, recently rolled out a new Diploma in Digital Forensics to cater to the rising demand for IT security professionals with the skills to investigate crimes committed using computers and digital devices. The first batch of students will join the course this April.

SaaS, PaaS, and IaaS: A security checklist for cloud models

Grazed from CSOOnline.  Author: Mark O'Neill.

How does security apply to Cloud Computing? In this article, we address this question by listing the five top security challenges for Cloud Computing, and examine some of the solutions to ensure secure Cloud Computing.

Could a new breed of DOS attacks make the cloud unaffordable?

Grazed from Government Computer News.  Author: William Jackson.

The cloud is the current Next Big Thing in computing, and the Next Big Thing in attacks could be a new breed of economic denial-of-service attacks intended to use up resources and drive up the cost of cloud computing, warns a senior security researcher at Adobe Systems.

“DOS is the next battleground,” Bryan Sullivan said Wednesday at the Black Hat Federal conference being held in Arlington, Va. “That’s where the future is going.”

Tale of Two Surveys: Opinions on Cloud Security Differ

Grazed from IT Business Edge.  Author: Ann All.

If there's one thing I've learned from my years in journalism, it's that you have to take surveys with a grain (or sometimes a whole shaker) of salt. I can't tell you how many times I've seen surveys with similar questions yield wildly different results, depending on the size and composition of the sample, the way the questions are asked, who asks them, etc., etc.

 

Cloud Security Alliance plans RSA summit

Grazed from ComputerWorld.  Author:  Bob Violino.

IT and security executives will get a chance to hear about some of the latest developments in cloud security at the Cloud Security Alliance's CSA Summit 2011, to be held Feb. 14 at the RSA Conference in San Francisco.

Europol to reveal cybercrime risk level

Grazed from ComputerWorld.  Author: Jennifer Baker.

European law enforcement agency Europol on Friday will present its assessment of the threat posed by cybercrime, along with its strategy to tackle it.

"Cybercrime is borderless by nature, this makes criminal investigations more complicated for law enforcement authorities," said Europol Director Rob Wainwright. "To effectively tackle cybercrime, adequate cross-border provisions are needed."

A Glimmer of Security Hope for 2011

Grazed from IT Business Edge.  Author: Michael Vizard.

We’ve been talking as an industry about the convergence of security and IT operations management for the better part of a decade.

Developer Says FBI Fiddled With OpenBSD

Grazed from Internet Evolution.  Author: Sean Gallagher.

A former contributor to the code in the OpenBSD operating system that handles encryption of data has alleged that the FBI paid developers working on the code to write in backdoor mechanisms to circumvent authentication and give law enforcement unfettered access to data.