• A smarter, faster, more controllable cloud

    Different types of cloud applications have different needs; a highly interactive application such as a voice chat program probably needs a high-quality connection; a file-backup service that transfers data in bulk might benefit from the least expensive transit between machines; a proposed system would let cloud developers control the way their data travels across different machines

  • Microsoft offers developers cloud security tips

    New paper provides best practices for writing applications for Windows Azure; one Microsoft security official: “it is important that people building software or hosting services in ‘The Cloud’ understand that they must also build software with security in mind from the start”

  • New research offers security for virtualization, cloud computing

    Virtualization allows the pooling of the computational power and storage of multiple computers, which can then be shared by multiple users; problem is, gains in efficiency and cost-saving are offset by increased cyber vulnerability; researchers have now developed software, called HyperSafe, that leverages existing hardware features to secure hypervisors against such attacks

  • Data protection manager for the cloud

    More and more companies begin to offer cloud security solutions; Iron Mountain offers CloudRecovery links into DPM; Seagate’s i365 business has launched the EVault for DPM 2010 backup and recovery appliance

  • Companies ignore cloud security

    New study finds that few businesses build security into cloud contracts; in fact, three-quarters of businesses surveyed said they had no procedures and policies for using cloud computing; Sixty-eight percent said end users and business managers — not the organization’s IT professionals — are made responsible for evaluating cloud computing vendors

  • Floating security tools make the cloud more secure

    Cloud computing offers efficiency and economy — but the Achilles Heel of the technology is security; where there is a security need there is a business opportunity, and some companies begin to offer cloud security tools, hoping to enjoy the benefits of first movers

  • view counter
  • IT experts: Security risks of cloud computing outweigh benefits

    Cloud computing services are expected to experience dramatic growth, hitting $44.2 billion by 2013, outpacing traditional IT spending; other estimates, including a recent study by Global Industry Analysts, indicate that by 2015 cloud computing services could represent a more than $200 billion market opportunity; still, worries about the security of cloud computing linger: 45 percent of IT professionals responding to an ISAAC survey say the risks of cloud computing outweigh the lower total cost of ownership (TCO), high return on investment (ROI), increased efficiency, and pay-as-you-go services

  • Group aims to set standard for cloud security

    A new consortium aims to provide a Common Assurance Metric (CAM) that will consist of objective, quantifiable measurements; it will draw from existing standards, which are often industry specific, to provide an international, cross-sector approach

  • U.S. scientists get free cloud free access

    Microsoft and the U.S. National Science Foundation (NSF) will provide free access to cloud computing resources for select NSF-funded researchers for the next three years; those selected will get to use remote Microsoft Azure data centers full of Windows/Dell servers and storage so that they can run compute-intensive algorithms on masses of data

  • FTC to examine cloud computing privacy concerns

    The FTC says it wants to examine potential threats to consumer privacy and data security posed by cloud computing services; David Vladeck, director of the FTC’s Bureau of Consumer Protection: “The ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers”

  • Prediction for 2010: The coming cloud crash

    Technology maven Mark Anderson predicts a big remote-computing service disaster; “My hunch is that there will never really be a secure cloud,” he says; businesses will view cloud services more suspiciously and consumers will refuse to use them for anything important, he says

  • Cybercriminals begin to exploit the cloud for hacking

    Cloud password cracker is a sign of things to come: cloud computing offers advantages of scale and cost, but its reliance on the Internet makes it vulnerable to hacking; “The cloud is going to offer the serious criminal huge computing resources on tap, which has lots of interesting applications,” says one security expert; “If nothing else, it should change a few threat models”

  • Top 10 information security trends for 2010

    Further adoption of cloud, social media, and virtualization technologies will continue to blur the network parameter; organizations — large and small — should consider a layered, centralized security solution that provides multiple security touch points within the network, rather than around it