On Tuesday at the InfoSecurity Summit in Hong Kong, a very interesting point about cloud came up for discussion. While I’ll be one of the first to say cloud gives organizations of all sizes lots of great benefits and resources they might normally have access to, there is another side to cloud. A much darker, scarier side that is being used by cyber-criminals. Continue reading »
I read a great article recently pinning cloud solutions versus on-premise to see what the experts anticipate will be the new widely adopted service model. As someone who comes from the on-premise security business, and being in the midst of figuring out the best way to transition traditional solutions to cloud delivered ones, this is a very important argument. After all, just about every organization has used the on-premise model for security, so why is cloud a better decision moving forward? Continue reading »
The very nature of virtualization makes it unique in that it adds a barrier between the traditional hardware and operating system layers. By very definition, virtualization creates an operating environment on the host hardware that allows for complete customization and allocation of resources, regardless of which operating system is installed. It is not uncommon to have several different operating systems reside side by side. In fact, recently even Microsoft opened their proprietary Azure cloud platform to support Linux builds.