Virtual Desktop Infrastructure: (Remote) Workers of the World Unite!

With the latest announcement of Google Chrome’s remote desktop application, it’s a great time to look at when and where virtual desktop infrastructure (VDI) makes sense.  While there are significant benefits to leveraging VDI, there are still some security risks associated with these implementations.

Continue reading

Why Encryption is Still a Cloud Standard

As we see more and more organizations starting to outsource their data to services such as Amazon and Telco-based cloud environments, there is an increased importance around the security of the actual data that resides in these environments. In some cases, organizations are moving business-critical and privacy sensitive data off-site to take advantage of reduced infrastructure costs, but in some cases, to leverage the security postures of the cloud providers themselves.

Continue reading

We have just gotten a wake-up call from the Nintendo Generation.

This morning while absorbing large amounts of caffeine in a vain attempt to wake from a turkey induced coma, I came across an interesting article over on Tech News World on the Internet of Things.  As some of you know, prior to joining the connected world of telecom, I actually spent awhile in the security space.  Just long enough to adopt the constant state between paranoia and acceptance of the fact that everything is a security risk, much like my fellow security brethren.

So when I came across this article on the Internet of Things and the wonderful world of security as it relates to this new(ish) trend, it couldn’t help but intrigue me.  Because well, whenever society gets a new toy to play with, you know there is a beautiful dark cloud of exploitation just around the corner.  The internet of Things is wonderful, and it’s going to be a huge headache for security folks.  Welcome to the (Unsecured) Internet of Things. Continue reading

It’s your imagination, kid. Come on. Let’s keep a little optimism here.

It seems like every day half the twitter feeds around cloud are about the great advancements we have seen such as in OpenStack and Big Data, and the new technologies we are seeing to help drive adoption of cloud computing.

Unfortunately, the other half talks to encryption issues, data leaks, vendor uncertainty…doom and gloom.  Most notably, the increased chatter around data privacy (both from an international government perspective, and the traditional risks associated with improper data loss protection controls) continues to impact one of the biggest trends trying to move forward: mobile device management. Continue reading

The question isn’t “what are we going to do,” the question is “what aren’t we going to do?”

This week at VMworld, there was a lot of different shifts in the cloud industry felt.  From security to functionality, the cloud started to inch a bit forward.  One area in particular got the VMworld bump, mobility.  According to VMware CEO Pat Gelsinger, we’ve moved past the mainframe to client-server transition and are now transitioning into a mobile-cloud stage.  Wait, what?  Doesn’t VMware focus on server virtualization solutions?  Why does he care about the transition to mobile clouds? Continue reading

You can’t stop the signal, Mal. Everything goes somewhere, and I go everywhere.

When I left the IT security space and moved into the mobility space, I got a lot of strange looks.  Many people wondered why I was moving away from cloud and security and abandoning it for nice, shiny gadgets like tablets and smartphones.  I still get the odd looks from people trying to figure out the correllation, and it’s only after sitting down with them that they realize that cloud has a LOT to do with mobility. In fact, if it wasn’t for mobility, some of the greatest innovations that are coming from cloud methodology wouldn’t exist.  It’s thanks to mobility that the next wave of employee enablement is going to exist.  Here’s why. Continue reading

Why don’t you cut the cute act, Danny boy, and tell me what it is you’re looking for?

Perhaps the biggest complexity when it comes to adopting cloud services is to manage the health and security of the cloud service.  For organizations who build their own internal clouds, the burden of security and management falls solely on the organization’s fine IT folks, but what happens when you outsource the environment?  Are you still required for all the care and feeding?  Is there a better way? Continue reading