With the latest announcement of Google Chrome’s remote desktop application, it’s a great time to look at when and where virtual desktop infrastructure (VDI) makes sense. While there are significant benefits to leveraging VDI, there are still some security risks associated with these implementations.
As we see more and more organizations starting to outsource their data to services such as Amazon and Telco-based cloud environments, there is an increased importance around the security of the actual data that resides in these environments. In some cases, organizations are moving business-critical and privacy sensitive data off-site to take advantage of reduced infrastructure costs, but in some cases, to leverage the security postures of the cloud providers themselves.
This morning while absorbing large amounts of caffeine in a vain attempt to wake from a turkey induced coma, I came across an interesting article over on Tech News World on the Internet of Things. As some of you know, prior to joining the connected world of telecom, I actually spent awhile in the security space. Just long enough to adopt the constant state between paranoia and acceptance of the fact that everything is a security risk, much like my fellow security brethren.
So when I came across this article on the Internet of Things and the wonderful world of security as it relates to this new(ish) trend, it couldn’t help but intrigue me. Because well, whenever society gets a new toy to play with, you know there is a beautiful dark cloud of exploitation just around the corner. The internet of Things is wonderful, and it’s going to be a huge headache for security folks. Welcome to the (Unsecured) Internet of Things. Continue reading
It seems like every day half the twitter feeds around cloud are about the great advancements we have seen such as in OpenStack and Big Data, and the new technologies we are seeing to help drive adoption of cloud computing.
Unfortunately, the other half talks to encryption issues, data leaks, vendor uncertainty…doom and gloom. Most notably, the increased chatter around data privacy (both from an international government perspective, and the traditional risks associated with improper data loss protection controls) continues to impact one of the biggest trends trying to move forward: mobile device management. Continue reading
This week at VMworld, there was a lot of different shifts in the cloud industry felt. From security to functionality, the cloud started to inch a bit forward. One area in particular got the VMworld bump, mobility. According to VMware CEO Pat Gelsinger, we’ve moved past the mainframe to client-server transition and are now transitioning into a mobile-cloud stage. Wait, what? Doesn’t VMware focus on server virtualization solutions? Why does he care about the transition to mobile clouds? Continue reading
When I left the IT security space and moved into the mobility space, I got a lot of strange looks. Many people wondered why I was moving away from cloud and security and abandoning it for nice, shiny gadgets like tablets and smartphones. I still get the odd looks from people trying to figure out the correllation, and it’s only after sitting down with them that they realize that cloud has a LOT to do with mobility. In fact, if it wasn’t for mobility, some of the greatest innovations that are coming from cloud methodology wouldn’t exist. It’s thanks to mobility that the next wave of employee enablement is going to exist. Here’s why. Continue reading
Perhaps the biggest complexity when it comes to adopting cloud services is to manage the health and security of the cloud service. For organizations who build their own internal clouds, the burden of security and management falls solely on the organization’s fine IT folks, but what happens when you outsource the environment? Are you still required for all the care and feeding? Is there a better way? Continue reading
If Cloud adoption from a business perspective was easy, this blog wouldn’t exist. Nor would the thousands of other tireless folks working on helping advance cloud standards from compliance to security to data and resource integrity. But when these businesses who do bravely go into the new cloud world, if it’s anything less than perfect, they face criticism from the entire IT community. Is this why we are seeing a resistance to move to cloud for many organizations? And what does this mean for the future of the cloud industry?
When it comes to security and cloud, it’s no surprise that it’s a headache. Traditional security tools focused on network and physical device connections as a way to track the flow of information and see the inner workings of the infrastructure.
So what happens when you take the physical devices out of the equation? What happens then? Continue reading
As someone who spends a lot of time perusing both Reddit and the now sadly defunct Google Reader (RIP!), I’m not personally surprised to start seeing a lot of discussions around whether corporations who outsource cloud storage or other services to third parties should be worried about privacy risks.
For example, an article this morning from the folks over at ZD brings up some great points about both the pros and cons about the great cloud race and how it could ultimately affect how data ownership is perceived. Continue reading