Author: David

March 21, 2012 Off

Banking On Cloud Computing

By David
Grazed from CloudTweaks.  Author: Jeff Norman.

Kylie Minogue’s classic song, “I Just Can’t Get You Out of My Head,” could double as the theme song for the current tech zeitgeist as it relates to the cloud. Everyone seems to be either embracing or debating cloud computing around proverbial water coolers. Even our grandmothers are wise to the new truth that mentioning a cloud doesn’t always mean a glance out the window. These septuagenarians (and older) are actually outshining a community whose relevance matters most to our wallets, our banks.

Banks and other financial institutions remain exorbitantly coy about what cloud computing stands to offer them. Begrudgingly, I admit that this is a reasonable fear. The recent economic crisis continues to linger, and public opinion locates banks at the epicenter of the financial quake. These houses of finance are determined to regain our trust; any other unconstrained fiascos would mar their progress toward that goal. Transferring the bulk of data regarding their primary systems to a cloud whose security and data protection are still suspect would definitely not be complete fiasco avoidance…

March 21, 2012 Off

Cloud Computing: 3 Big Security Themes At Black Hat Europe

By David
Grazed from InformationWeek.  Author:  Matthew J. Schwartz.

Want to succeed at security? Then lose the perfectionism, stay skeptical, and treat new technologies, including the cloud, with caution.

Those were three common themes that emerged during last week’s Black Hat Europe conference in Amsterdam. Of course, the annual gathering also featured plenty of hardware hacking, details of new bugs in everything from SAP to Cisco VoIP systems, all-day technical training sessions, and loving tear-downs of Apple iOS and Google Android mobile operating systems…

But throughout many of the sessions these three themes–along with corresponding admonishments and warnings–were consistently voiced:

1. Forget Perfectionism. Cryptographer Whitfield Diffie, in his keynote speech opening the conference, highlighted a persistent challenge faced by information security practitioners: they get no credit for all of the attacks they successfully repel. "Even when defense has done its job well, it is blamed for doing anything other than doing it perfectly," he said. But who has the time–or money–for perfection? Instead, businesses must emphasize getting something in place that’s good enough to do the job.

One case in point involves Bradley Manning, who allegedly leaked confidential government memos to WikiLeaks. "In one sense, very clearly, for the [Department of Defense] it is a security failure," he said. But what really happened? Foreign adversaries didn’t break the Pentagon’s high-grade cryptography, crypto equipment, or key management setup. Instead, the attack hinged on a single insider who already had access to the materials in question.

"A variety of people who designed the system should say, we did a pretty good job of that. We had an awful thing happen, but it’s something that the opponents can’t mass produce," Diffie said. In other words, almost any security can be defeated. But just how gracefully does it fail, and how difficult or expensive would it be for an attacker or attackers to successfully repeat the effort?

2. Keep Cloud Security In Perspective. Avoid the cloud? Hardly. As long as it offers lower costs and better ease of use than traditional on-premises systems, that’s never going to happen. From a security standpoint, however, cloud architecture isn’t always ideal, and thus it demands strong doses of security skepticism for anyone who’s called on to secure business data that’s stored there. 

"What I find interesting is that Web security bugs are existing with companies that we’re pretty sure know what they’re doing," said Felix "FX" Lindner, head of Recurity Labs in Berlin, in an interview at Black Hat. "Even Google has issues doing that," he said.

In other words, it’s tough to get security right in the cloud, not least because clouds aren’t static. Developers keep pushing new code, as do business partners, plug-in providers, and everyone else who’s tied into the cloud ecosystem. "The inherent problem with cloud is it’s a moving target," he said. Furthermore, just one coding error in any of that code might be exploited by an attacker to gain access to a cloud-based target.

That constantly evolving code base may also not be protected with extra layers of security. In fact, the opposite is most often true. "We worked on privilege separation in the operating systems for years and years–don’t work as root, and stuff like that," said Lindner. "But the cloud does it, and sometimes there’s just one account, or password." In such scenarios, attackers may need to compromise only one credential to gain the keys to a business’s cloud kingdom.

Some cloud providers, however, are better than others. "Ridiculous as it might sound, I think Microsoft is doing it right with Live.com–‘We’re using the secure development lifecycle, and we don’t do anything without SSL,’" said Lindner. "I don’t understand why any Google functionality is available via HTTP; it’s not like they don’t have the computer power to do it all in HTTPS." Indeed, if the cloud remains hard to secure, why aren’t cloud providers offering as much out-of-the-box security, by default, as possible?

3. Beware Free Lunches. Whether it pertains to cloud security, the challenge of hardening mobile devices, or the speed with which vendors patch, Black Hat presenters urged skepticism: trust nothing, verify as much as possible, and above all, get working security in place quickly.

For a profession that tends to reward paranoia, however, many conference attendees appeared to arrive without their skepticism intact. The well-known first rule of Black Hat, notably, is to never trust the conference’s wireless network, since it’s more than likely that someone will be sniffing your packets or attempting to own your mobile device. Accordingly, deactivate Bluetooth, and beware Wi-Fi–especially hotspots with names such as "LEGITFREEWIFI."

Otherwise, you may end up on the wireless router with that SSID, which happens to be owned by Steve Lord, a director at information security consultancy Mandalorian. Lord brought an extra router with him to Black Hat Europe, then used dsniff to log the credentials that flew across the router. "Weaponizing hotspots is fun," he said in his Black Hat Europe presentation.

Any "should have known better" free hotspot takers? He had more than a few, including one apparent conference attendee who used the hotspot to telnet into his Cisco router–username: "Cisco," password: "Cisco." "But I’ve no way of knowing if someone was just messing with me or they really logged on, as dsniff didn’t log the full session, just what was sent," said Lord in an interview.

Thankfully, Lord also said he would name no names and had deleted all of the collected data, noting that it was lucky he wasn’t running an "evil mobile coffee hotspot."

Of course, it was alarming to see information security professionals fall for what should have been an obvious trick. The moral: "If something at a security conference looks too good to be true … don’t connect to it," Lord said. Those are words to live by–and not just at security conferences.

March 21, 2012 Off

Cloud Computing Startups Raise Big Money: UPDATE 10

By David

Grazed from CloudTweaks.  Author: Sourya Biswas.

Today, there are two startups in focus – Vaultive and Eccentex.

Vaultive

Cloud data encryption services provider Vaultive recently completed a $10-million funding round led by .406 Ventures, New Science Ventures and Harmony Partners. Headquartered in New York with its R&D center in Tel Aviv, Israel, Vaultive plans to launch its first product next month. Beta testing for the product, Vaultive for Hosted Exchange, is in progress…

March 21, 2012 Off

Racemi Joins with Rackspace to Facilitate Migrations to Cloud

By David
Grazed from Sys Con Media.  Author: Glenn Rossman.

Racemi, provider of technology that accelerates migrations to cloud computing, on Wednesday announced it has joined the Cloud Tools Network with Rackspace Hosting, a specialist in the hosting and cloud computing industry.

Through this joint collaboration, Rackspace Cloud customers can seamlessly migrate existing applications using Racemi Cloud Path, which migrates applications in their current tested and proven configuration without requiring server rebuilds or additional technology stacks…

March 21, 2012 Off

Use a tiered cloud strategy to skirt outages

By David
Grazed from InfoWorld.  Author: David Linthicum.

Two seemingly unrelated events in the cloud computing space should make you think about taking a different approach to your sourcing strategy for the cloud. The first event: Cloud outages, such as the recent Microsoft Azure failure, have shown us that no single cloud is infallible. The second event: Google, Amazon.com, and Microsoft have all dropped their cloud services’ prices.

The second event means you can deal with the first event better. In your own data center, you’d have your servers fail over to others if needed. And any large organization will have a failover strategy to other data centers or external providers for business-critical information and processes so that an outage doesn’t stop the business…

March 21, 2012 Off

Dell delivers one-stop cloud computing service based on OpenStack

By David
Grazed from V3.co.uk.  Author: Daniel Robinson.

Dell is looking to position itself as a one-stop provider for cloud computing with the launch of a reference platform based on OpenStack and Ubuntu, running on Dell hardware and backed by its service and support know-how.

The Dell OpenStack-Powered Cloud Solution is aimed at both enterprise customers and service providers, and is intended to deliver an open-source alternative to proprietary cloud computing stacks for organisations building private cloud infrastructure, and enable them to get up and running relatively quickly, Dell said…

March 21, 2012 Off

CIO, Meet The CFO: 5 Ways To Get More From Your Cloud

By David
Grazed from Forbes.  Author: Irv Rothman.

Cloud computing may be the most disruptive technology for businesses since the Internet. Cloud doesn’t just optimize IT departments, it has the power to change how a business operates. The transformative power of cloud computing, however, is not easy to understand nor is it an overnight journey either.

A successful journey to the cloud requires intense planning and alignment across all parts of the business; essentially a roadmap that helps navigate the financial and technology decisions that need to be made over the years ahead. The payoff will be worth it, but to get there, organizations need an internal champion…

March 21, 2012 Off

Cloud Computing = Green IT … Right?!

By David
Grazed from B/OSS.  Author: Peter Caron.

We all know that green IT can only be built with cloud technology. It is common sense. Fewer physical servers means less energy, means green. Right? Not exactly. But a common assumption, even in the green IT community, is that cloud computing is the only way to achieve green IT. This is, at least on the surface, true, but the reverse is not: Cloud computing is not always green. Let me explain.

The green of IT regularly garners headlines. Some examples from the past year are Facebook’s Open Compute Project Initiative, Google’s Solar initiatives and Ivanpah Solar Electric Generating System (“largest solar energy project in the world"), with more that $168 million invested. Other examples are Yahoo’s Chicken Coop Data Center Design: a 155,000-square-foot data center, which can accommodate 50,000 servers, is cooled almost 100 percent by outside air (in contrast to the large power-hungry chillers in most data centers) and uses 40 percent less energy than typical data centers…

March 21, 2012 Off

EMC Expands Cloud Services to Accelerate the Transformation of IT Environments

By David
Grazed from MarketWatch.  Author: PR Announcement.

EMC Corporation today announced an expanded portfolio of cloud services to help customers accelerate the adoption, consumption, optimization, and management of cloud technologies. The new services help customers accelerate their IT transformation initiatives, enabling IT to more quickly deliver ITaaS to their clients, thereby helping customers to fully realize the benefits of efficiency and agility gained through all phases of their cloud computing. The new EMC services announced today address the transformation of people, process and technology and range from strategy and business case development, to design and deployment, to support, optimization, and education…

March 21, 2012 Off

Another Cloud Computing IPO That’ll Price Big

By David
Grazed from CNBC.  Author: Bob Pisani.

The hot IPO this week is — what else — another cloud computing-type company, ExactTarget, looking to price 8.5 million shares from $15-$17 tonight (Wednesday), for trading tomorrow.

It will certainly price above that, and open in the $20s, if recent history with cloud computing companies hold.

I’ve used "cloud computing" as a generic term, but companies like ExactTarget are really about interactive marketing, specifically cross-channel interactive marketing…