Cloud computing is trustworthy three major areas of security technology face challenges

"51cto.com exclusive feature" 2011 with the global economic situation improved, it industry will be fully recovered, cloud computing has a new opportunity for development. More and more companies are starting to accelerate into cloud computing. Gartner predicts that the security application services provided by cloud computing will grow three times times in 2013. It is undeniable that cloud computing will be the direction and trend of IT development in the future, and its security issue has become one of the most controversial topics in the industry. Major security companies are also trying to promote their own advantages, and the major cloud computing services and platform providers to this problem show great ...

Secure "cloud computing" environment

The company announced that its Besecure Web gateway device could now be used to provide cloud computing services to protect against various content-based application layer attacks. "Moving to the cloud" is a priority for many businesses and government agencies today, and there is no doubt that cloud computing has the same benefits, but because of security vulnerabilities, cloud applications face very real and costly data security risks. In fact, cloud environment presents a kind of aggregation situation, in contrast, the physical boundary of computing environment becomes blurred, in this kind of application environment, ...

RSA CEO Arthur: Security issues to cloud computing set three "ridge"

October 21, 2010 News, the two-day International Forum on Information Security, and the RSA China Congress, officially opened today. Attendees will be in two days to hear 50 more presentations from top information security experts. According to 51CTO reporters, the forum invited more than 40 well-known information security experts at home and abroad, topics covered in the field of information security cloud computing security, compliance, Trustworthy Computing, cryptography, anti-network fraud and other important issues. The General Assembly will focus on education for the purpose, more on the academic exchanges, the International information security field ...

The advantages and disadvantages of enterprise security services in cloud computing

Faced with the development of cloud technology in enterprise security services, many security vendors are trying to add their own security products to the cloud. But when you first launched security as a service product, you simply moved the centralized management console to the cloud. This is a good start, but it does not make the most of the cloud. Over the past few years, more and more companies have turned to SaaS to reduce costs. And one of them is security services, and it deserves our individual discussion. A growing number of traditional software security vendors are working to develop and improve their offerings based on services. These ...

Cloud computing Technology: Heaven or Hell?

Cloud computing technology is the latest in the Internet technology concept, but since the cloud computing technology, whether the Internet users, experts, enterprises, security vendors to cloud computing technology is widely debated, facing new technology as we stand at a fork in the road, one side is heaven is hell. We are faced with a choice, unprecedented, and every technological innovation is the choice for the Internet. Cloud computing Technology: Is it heaven or hell? "If we do well, we will enter a safe haven, but if we do wrong ... "According to the Security Research Institute ...

From Ford Motor to corporate cloud computing

Cloud computing, as a new concept, has been applied to many areas of the Internet. In the area of Internet security, the choice and use of enterprise cloud computing is still controversial. To understand the security of enterprise cloud computing, we first need to know what is cloud computing, and understanding of cloud computing, we seem to be able to from the hundred years ago in the history of Ford car found common ground. From Ford to why we want to use cloud Henry Ford and 11 other partners in 1903 when the establishment of the Ford Motor Company, determined to let the car into the ordinary consumer households, five years later, adhering to ...

Cloud computing brings information security into an alliance era

Network security has been a hot topic, especially after the internet into the era of cloud computing, whether it is information security experts, industry users or security vendors in the cloud era of network security, the pros and cons of a wide range of disputes, August 19, 2010, 2010 China Information Security Annual Meeting and the 8th session of China CSO Club security manufacturer representative-Neusoft Network Security Marketing Center deputy general manager management to "cloud computing to accelerate the security industry internal technology integration" as the topic of the issue, elaborated the "cloud" to the information security industry opportunities and challenges. Neusoft management that from the beginning of the WEB2.0 era, a large number of ...

Two big questions about IT security from virtualization and cloud computing

"The benefits of virtualization and cloud computing will be included in most enterprise IT infrastructure discussions in 2010," China's IDC Circle reported February 23. Virtualization has proven that it can save money through server consolidation and better utilization of resources. More virtualization technology is expected to be used throughout the server infrastructure, in other areas of the IT stack, and on desktops. The growth of SaaS (software-as-service) applications such as Salesforce.com and the success of IT services demonstrate how centralized remote computing can also provide more efficient ways to provide users with technical resources ...

New challenges to password protection from cloud computing services

But, according to David Campbell, a security expert, hackers who use Amazon's cloud-computing services for password brute-force hacking, even if they don't use the combination of uppercase and lowercase letters that security experts recommend, It may also be impossible to use this service to crack a 12-bit length password for reasons of high cost. At present, Amazon provides users with a cloud computing network service called EC2, which is billed hourly. And if you want to use this service to brute force a 12-digit password, the hacker needs to pay more than 1.5 million dollars for it ...

Low-cost cloud computing cracked wireless networks

A security official unveiled a low-cost service to crack a wireless network, using cloud computing to verify the safety of the wireless network password, using a dictionary of about 135 million words. This service, known as WPA Cracker (WPA cracking), is a cloud-related service based on about 400 CPU clusters. With 34 dollars, you can try 135 million different passwords in 20 minutes, and if you're less stringent on time, you can run the service for 40 minutes, with a cost halved to 17 dollars. In addition to the cloud computing stunt, this dress ...

HP says cloud computing is not safe enough to handle critical data

On October 22, HP CEO Hurd at Gartner's Symposium/itxpo show yesterday that cloud computing is not safe enough to handle critical data. According to foreign media reports, Hurd pointed out that cloud computing services-especially outside the corporate firewall services need more "excellence" to provide sufficient security. Commenting on the potential of cloud computing, Hurd said, "From a security standpoint, there are still a lot of problems to be addressed to ensure the development of cloud computing." "Hurd said the HP network system every day ...

Exclusive analysis: Network threat management based on cloud computing

Why is the current web threat more difficult to deal with than the threats of the past? Mainly embodied in the following: 1. Number。 In 2008 alone, malicious code grew at an unprecedented rate of 200%. 2. Rapid change. Attackers know how to change malicious code to bypass the existing security defenses. 3. Targeted stealth attacks. Some malicious code is dormant for several months before it is activated, while others are targeted at specific populations, geographic locations, industries, or businesses. 4. Trust. Users trust legitimate Web sites and social networks, so use ...

Experts talking about the security strategy of cloud computing environment

External networks that use cloud computing environments can gain the benefits of offsite storage backups, but at the same time pose some dangers: viruses, spam, malware, and identity thieves are some of the threats you might face. CIO channel weekly Hot "dot" article how does the CIO resolve the IT team interpersonal conflict? Hold on and give up: How should CIOs decide how to reshape government CIO functions? Challenges faced by CIOs in the 2009 and coping strategies three lessons I experienced in the strategic transition story away from CEO "intuitive decision" CIO how to seize the opportunity? According to Google company negative ...

Multi-site vulnerabilities expose cloud computing security vulnerabilities

While cloud computing has become a hot technology trend, more of its security black holes are being exposed, the Russ McRee, a network security expert, who demonstrates how a security flaw in a cloud computing service provider exposes many of its customers to risk. The exposed vendor, Jack, a software-service (SaaS) provider, provides search and other Web services for technology, E-commerce and other types of Web sites. McRee found an XSS (cross-site scripting) error in Jack's Social search function.

Cisco CEO Chambers says cloud computing is a security nightmare

In the afternoon of April 23, according to foreign media reports, Cisco Chairman and CEO Chambers (John Chambers) said in Wednesday that cloud computing is "a security nightmare." In a keynote speech at the RSA Security conference, Chambers said that cloud computing is a general trend, but it has a huge impact on cybersecurity technology, "and users are not sure what data the data center stores." As a network equipment company, we should be delighted with the popularity of cloud computing, because it will drive our sales. But this is another security nightmare and cannot be solved in the traditional way. ...

US Federal: Security proposals for cloud computing stop Gmail and other services

Beijing time March 18 morning news, according to foreign media reports, the United States Federal Trade Commission (hereinafter referred to as "FTC") held a meeting in Tuesday with industry representatives to discuss the security of cloud computing, activist organization "Electronic Privacy Information Center" (EPIC) suggested that the FTC temporarily stop Google Gmail and Google Docs and other services. In response to the rising cloud computing services, many activist groups have proposed greater legislative protection for security reasons. Some manufacturers believe that this is not conducive to the development of cloud computing. In this case, the FTC convened together this week for ...

IBM security experts: World Wide Web, web2.0 and cloud computing are not secure

"The World Wide Web, web2.0 and cloud computing are not safe," said Peter Allor, IBM's senior security strategy expert and network event and vulnerability management program. "Who is more secure in the World Wide Web, web2.0 and cloud computing?" he asked in a speech about cyber-security trends. Immediately he replied: "It's not safe." "Now the threat of corporate IT security is shifting from web1.0 to web2.0, and the future will be a threat to cloud computing," he said. "IBM's latest 2008 annual X-force report indicates that the website has become an enterprise ...

How do enterprises grasp it construction in cloud computing era

According to the "2009 It Decision makers Critical survey" report, Cloud Computing (Cloud Computing) and derivative software as services (SaaS) help companies reduce the cost of information investment, and 10.13% of respondents said they would import the technology service in 2009, but Does cloud computing really help companies fight the recession? At the same time, the rise of cloud computing has attracted the attention of hackers. According to security manufacturer AppRiver, 2009 cloud computing may be a wave of hacker attacks. Faced with the economic downturn and security threats, ...

March 4 Foreign Headlines: 10 latest security threats forecast cloud computing as new target

"51cto.com fast Translation" The continuous introduction of new technologies in a significant increase in computing power to facilitate people's lives, but also inevitable to make cyber criminals have the attack of new weapons. In the 2009, hackers will launch new attacks in many areas such as cloud computing and social networking. Here are the top ten threats we've listed: Malware entering the 2.0 era malware will go into the 2.0 era along with Web2.0, which will increasingly launch attacks on Web 2.0 services, including the latest cloud services. Many companies have just adopted the cloud-based ...

Virtualization cloud computing will set off a wave of hacker attacks in the future

The popularity of virtualization technology, cloud computing and other emerging technologies has also attracted the attention of hackers. According to security manufacturer AppRiver, Cloud Computing in 2009 will be a wave of hacker attacks. Companies, in particular, may have to face such risks because they need these emerging technologies to help them cut costs during the recession, AppRiver senior security analyst Fred Touchette said. Although overall IT spending this year is not optimistic, these emerging technologies will still show strong growth momentum, which also means that a ...

Total Pages: 417 1 .... 81 82 83 84 85 .... 417 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.