Andy Dancer in
Secure Data Centers, Securing the Cloud
Jun 30th, 2010 |
In March the Cloud Security Alliance published “Top Threats to Cloud Computing V 1.0” to help organizations better understand the risks of cloud computing and to consequently make more informed risk management decisions when adopting cloud strategies. In that document the CSA outlined seven threats and suggested steps for remediation.
At Trend we have traditionally embraced a layered approach to security, and cloud security is no different. Each layer alone is valuable but not impenetrable; together the layers form effective protection. Mimicking this traditional layered approach for...
Dave Asprey in
Securing the Cloud
Jun 13th, 2010 |
As I read different blogs, IT industry analysts and media, I see contradictions galore. Some articles position cloud computing as more secure (like this one) while other journalists highlight new security challenges (here, here, here and here). The concept of the cloud is still emerging and fallacies around cloud computing abound. Below are the five myths that I encounter most frequently while listening to conversations about cloud computing:
1) Virtual private clouds provided by Infrastructure-as-a-Service (IaaS) players are as secure as internal datacenters
“Virtual private clouds”...