Threats to cloud infrastructure are widely discussed, but much of the talk
is based on assumptions — the cloud must be less secure — and fears
— this is something new, so I don’t quite understand all the
OK, we will say it: Security is an issue in the cloud … and in traditional
managed hosting, in-house data centers, and desktop endpoints.
What’s important is to understand the specific security issues of each
Alert Logic (Logicworks‘ security partner) recently released the latest
“State of Cloud Security” report, which provides and in-depth view on the
major issues impacting security in the cloud.
What threats should you be worried about in the cloud?
According to Alert Logic’s report, the top three incidents for cloud
hosting customers it surveyed were:
Web application attacks that exploit vulnerabilities in web-facing
Cloud more secure than traditional IT? David Linthicum explains why.
As we begin to study security, healthcare, and the cloud, we’re finding
that cloud-based data storage systems are perhaps more secure than
traditional on-premise systems. Most in the healthcare space have yet to
accept this situation, and perhaps won’t accept it until more deployments
The data is beginning to appear. According to Alert Logic’s Fall 2012
State of the Cloud Security Report, the variations in the threat activity are
not as important as where the infrastructure is located. The report finds... (more)
Those who think cloud computing requires no forethought or planning are dead
wrong. Considering the fact that cloud computing is a truly complex
distributed architecture, there is a lot to think about in terms of what
components are leveraged (e.g., storage, compute, database, etc.), how they
are configured, governance and security, and monitoring and management. Just
to scratch the surface.
Thus, those who implement cloud computing need to get smart around how to
approach the architecture. Many skip this step or role and move directly to
the good stuff, the technology. A lac... (more)
Dropbox, Evernote, Google Drive, Apple iCloud. Chances are if your employees
have Internet-connected mobile devices, they are using these and other
services to store and transmit your company data — with or without your
approval. That’s according to a new study from Enterprise Strategy Group,
which found that while more than 75 percent of companies it surveyed had
policies that prohibit the use of online file sharing and related tools, by
and large their employees went ahead and used them anyway.
As Computerworld’s Lucas Mearian reports: “Even if employees are
physically prohibi... (more)
Whenever you go shopping there are usually a few factors that determine what
you buy and what you pass up.
One is obviously money (though we all wish this wasn’t the case). Price can
be a deciding factor, but often we will pay a little more for something if it
offers measurable value.
Another factor is trust: Do you know what’s being sold? Do you trust
who’s selling it? Can you trust that it will fulfill your needs?
The flipside of trust is often chance: Are you willing to take a chance on a
new product that will hopefully deliver the same or better results than your