Cloud Computing: Amazon Launches Certificate Manager. Offers Free SSL & TLS Security Certificates

Grazed from  Author: Arnand Karwa.

The cloud computing industry is getting more and more competitive day by day. It has become a race between the leading cloud providers like Amazon Web Services (AWS), Google Cloud Platform, Microsoft Azure, and IBM SoftLayer.
Amazon Web Services in an effort to maintain the competitive edge of its services has now launches Amazon Certificate Manager (ACM). With this Certificate Manager, the web developers would now be able to obtain TLS (Transport Layer Security) and SSL (Secure Socket Layer) security certificates for free...

IBM Sees 2015 Growth in Cloud, Security and Systems

Grazed from eWeek.  Author: Darryl K. Taft.

 IBM's strategic initiative led the way in 2015, with cloud now a $10 billion business and security a $2 billion unit. Systems and analytics also grew.  Despite another quarterly revenue slide, IBM sees a silver lining in its strategic imperatives as these key focus areas—cloud, analytics, mobile, social and security—show significant growth and indicate Big Blue is committed to succeeding in its transformation.

In the fourth quarter of 2015, IBM saw its revenue decline 9 percent to $22.1 billion; however the company's strategic imperatives revenue grew 26 percent (adjusting for currency and the System x divestiture) to $28.9 billion and now represents 35 percent of the company's overall revenue...

China’s Cloud Computing Services - Security Concerns and Solutions for Foreign Businesses

Grazed from China-Briefing. Author: Jake Liddle.

For a new enterprise looking to start business in China, cloud computing means a significant reduction in startup operation costs. Where expenses are often spent on traditional IT infrastructure and its maintenance, cloud computing not only saves money and time, but can also provide flexibility and space for innovation.

It additionally makes for easier development of smaller businesses, facilitating wider availability and access to high performance computing. However, despite this multitude of benefits, there are many factors a business operator should consider when looking to utilize cloud services in China, such as the services available and the potential security risks involved...

Twistlock Strengthens Container Security for Enterprise Computing

Grazed from Twistlock.

Twistlock, the leading provider of cloud container security solutions, today announced the general availability of the Twistlock Container Security Suite and a strategic partnership with Sonatype.

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and Security do not have the level of visibility and control that they are accustomed to. At the same time, for DevOps to succeed, security and operations controls must be as agile and move as quickly as the assets to be protected. Twistlock's Container Security Suite, the only dev-to-production security product on the market today, enables just that. The Suite allows security operations to come together with developers to achieve security control and compliance without impeding the operational benefits of container technologies.

With a successful beta program that included 15 enterprise customers, including Wix, AppsFlyer and HolidayCheck, Twistlock's technologies are now available for all eligible customers worldwide. This makes it possible for many additional businesses to benefit from the vulnerability management, fine-grained access control and smart runtime protection capabilities offered by Twistlock.

IBM Enhances Data Economics and Storage Security for the Cloud and Cognitive Era

Grazed from IBM.

IBM today announced new innovations to its IBM Spectrum Storage family of software-defined storage to help clients improve storage management, data security and reduce data costs as they deploy new technology to support cognitive and other data-driven applications across hybrid cloud environments. 

IBM Spectrum Storage is designed to help clients securely embrace the explosive growth of data and support both traditional and next generation applications. New features to improve security and cost-effective management of large amounts of data and storage, include:

Bracket Computing wins $45 million to secure cloud with encapsulated data cells

Grazed from BusinessCloudNews.  Author: Editorial Staff.

Security start up Bracket Computing has been awarded $45m in a Series C investment round to develop its system for making content safe on the cloud.  Bracket’s Computing Cell technology works by encapsulating content in cell in order to secure it. The enveloped data and applications can then travel in safety across multiple cloud environments, according to its inventors. The Cell technology simplifies the increasingly complex issue of cloud management by consolidating security, networking and data management into a single construct.
The cell can run across multiple public clouds and in a customer’s own data centre. The cell structure also brings consistency to the cloud, as it protects client apps from the performance changes that can occur in cloud computing...

Verizon's Secure Cloud Interconnect Service Now Available for Public Sector

Grazed from EDGL. Author: Deena M. Amato-McCoy.

In effort to remove another barrier to the adoption of cloud computing across the public sector, Verizon is giving this segment access to its Secure Cloud Interconnect service, a software-defined networking offering that delivers the security, reliability, performance, simplicity and efficiency needed to support mission-critical workloads and applications.

Public sector organizations across federal, state and local, education and public safety are embracing the benefits of cloud computing, however many struggle with the complexity of seamlessly connecting, managing and securing their cloud environments — an issue that can extend across multiple clouds and data centers. Verizon’s Secure Cloud Interconnect service helps simplify this complexity by providing a secure, private Internet connection that features consumption-based bandwidth, pre-provisioned on-demand resources, application performance, multiple classes of service and usage-based billing models with simple provisioning and management via a centralized online portal...

Xen Project 4.6 released with enhanced security to match challenges in cloud computing, IoT

Grazed from ComputerTechnologyReview. Author: Anna Ribeiro.

The Xen Project Collaboration Project hosted at The Linux Foundation released Tuesday Xen Project 4.6 focuses on improving code quality, security hardening, enablement of security appliances and release cycle predictability. It also comes with significant amount of contributions from cloud providers, software vendors, hardware vendors, academic researchers and individuals to help with this release.

The community continues to strive to make Xen Project Hypervisor secure open source hypervisor to match security challenges in cloud computing, and for embedded and Internet of Things use-cases. With this release, Xen Project’s Virtual Machine Introspection (VMI) is natively supported on both Intel and ARM chips, making it an ideal API for developers building monitoring and security applications...

As Hackers Increasingly Target The Cloud, Rackspace Turns To Military Vet With Cyberwar Experience

Grazed from International Business Times. Author: David Gilbert.

In the dead of night, two Navy SEALs and a veteran military officer glide toward a U.S. military facility, water lapping quietly against the side of their canoe. Suddenly two navy boats gun their motors as they pass the trio, but they fail to spot the group attempting to break into the secure facility. This is the kind of operation Brian Kelly used to handle in special ops for the U.S. government, to identify gaps in security -- in fact, no one spotted him that night, and he was able to penetrate the facility, resulting in the firing of an soldier found asleep on the job.

Today, as chief security officer for cloud computing company Rackspace, the former Air Force lieutenant and then military consultant is using his stealth and smarts to protect the data of the firm's 300,000 customers. And he's facing unprecedented attacks on an entirely new battlefront: the cloud...

Is BYOK the key to secure cloud computing?

Grazed from CIO. Author: Mary Branscombe.

Thanks to Edward Snowden’s revelations about the NSA, the comprehensive hacking of Sony, and on-going legal battles over whether email stored in the cloud belongs to the people sending it or the service hosting it, more and more cloud services have moved to encrypt data. Some are going even further, offering Bring Your Own Key (BYOK) options, where the user holds the encryption keys for their own cloud data.

Google Compute Engine started offering a preview service for encrypting both data and compute with your own keys this summer, and Amazon offers both soft key management and the much pricier (and slower to set up) Cloud HSM service for EC2 and S3 instances, where your keys live in dedicated Hardware Security Modules in Amazon’s cloud. Adobe Creative Cloud now supports customer-managed data encryption keys to protect content synced to Creative Cloud accounts...