Justin Foster in
Cloud-based Security, Cyber crime, Privacy, Compliance and Identity, Securing the Cloud, Virtualization
Nov 29th, 2010 |
Cloud Security Alliance Congress 2010 Summary – Part 1 of 4 parts
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.
Keynote Address: Creating a Safer, More Trusted Internet
Scott Charney, the Corporate Vice President of Trustworthy Computing at Microsoft, kicked off the congress with his...
Dave Asprey in
Cloud-based Security, Privacy, Compliance and Identity, Secure Data Centers, Virtualization
Nov 16th, 2010 |
As effective as today’s malware detection may be in physical environments, implementing a solution designed for these environments creates new challenges in the virtual world by not taking into account their inherent differences.
These challenges directly impact the ability of enterprise virtualization efforts in their movement from cost-efficiency to quality of services and ultimately, to business agility. It is this last stage where IT can truly be delivered as a service – or via a cloud – and business can request these services on-demand.
Trend Micro has an informative White Paper on this...