Tags » Cloud Security

Cloud computing: You are probably ignoring the biggest security flaw

There’s an ongoing debate about the security implications of using cloud computing services versus running IT systems in-house.

Cloud advocates note that the largest cloud companies will have hundreds, or even thousands, of security staff and the time and money to keep their systems up to date. 67 more words


Cloud Architecture and Cloud Solutions

Thе humming distributed computing innovation hаѕ made swells in thе IT world with itѕ supreme adaptability, deftness, аnd economies оf scale. In fact, organizations spreading over асrоѕѕ diffеrеnt verticals аrе соnѕidеring moving thеir IT assets tо thе cloud; notwithstanding, security ѕtill iѕ thе highest  879 more words

Cloud Security

ISC2 Certified Cloud Security Professional (CCSP) - My take

I recently passed ISC2’s Certified Cloud Security Professional (CCSP) certification.

While preparing for the certification I found that there are hardly any reviews shared by individuals who had already taken the test for the benefit of ones who plan to take it and want to get a test taker’s perspective. 215 more words


Cloud security – the channel’s opportunity

Cloud provides a huge opportunity for the channel. However, resellers are at risk of losing out on revenues unless they help to address one of the major barriers of adoption; cloud security.


Debate: Threats to cloud security are overhyped.

Yes, of course these threats are overhyped. For whatever cloud service you are thinking about – a software-as-a-service (SaaS) offering like Box, an infrastructure-as-a-service (IaaS) offering like Amazon Web Services, or a platform-as-a-service (PaaS) offering like Windows Azure – there are solutions for this virtual space that are exactly equal to or nearly equal to the prevention and detection controls you already deploy within your physical world perimeter. 26 more words

Cyber Threat

What to do when hackers break into your cloud

There are two major types of public cloud computing attacks: single-tenant and cross-tenant. A cross-tenant attack is the stuff of IT nightmares, but it has not yet occurred. 32 more words