Authoritative release: The biggest threat to cloud security and its solutions

The "51cto.com exclusive translation" Cloud Security Alliance (Cloud) released its first concise report on cloud security risk and a more lengthy "critical regional Security Guide" for the CSA (download address: http:// Cloudsecurityalliance.org/csaguide.pdf, for the biggest threat listed in the report, CSA condensed the 76-page Security Guide to 7 of the most common, most dangerous threats, based on these ...

Cloud Security: 10 issues that must be clarified before entering the cloud (1)

The hustle and bustle surrounding cloud computing may make you think that there will be a massive adoption of cloud computing tomorrow. However, many studies have shown that security is the biggest obstacle to large-scale adoption of cloud computing. The reality is that cloud computing is just another step in the way of technology evolution along host, client/server, and Web applications, so it has its own security problems, just like all other phases. Of course, security concerns do not prevent the use of these technologies, nor can they prevent the adoption of cloud applications that address the real business needs. To ensure that the cloud ...

Weather: Cloud security brings complex security challenges

It is also an event in the field of information security, and every year RSA conference always brings to the participants a lot of thinking. This year, security experts and academics from around the world have become more realistic about cloud computing after the security issues of cloud computing last year caused widespread concern in the industry. How to solve the problem of identity authentication, how to avoid security risk, how to balance performance and ease of use, how to implement business cloud migration, how to plan private cloud and public cloud, how to strengthen the virtualization technology of cloud, how to ensure the exit mechanism is effective when users are increasing the demand of cloud computing technology? In the forest general ...

Enterprise Terminal security protection under "cloud security"

As the most basic component node of the enterprise network, the terminal is the target of hackers and virus makers because it stores a large amount of sensitive data, meanwhile, because the terminal faces the internal staffs of the enterprise directly, the management is difficult, which leads to the weakest link in the Enterprise network. This allows enterprise users to rethink their own terminal security! Coincidentally, July 24, a theme for "Rethink Your Terminal Security" cloud Security 2.0 meeting, trend technology company in theatre form to deduce the current terminal virus complex situation, and to enterprise users launched Cloud Security 2 multi-level terminal Ann ...

Lenovo Network to join the CSA Cloud Security Alliance

Recently, the domestic first-line security manufacturers Lenovo Network Royal officially approved to join the global "Cloud Security alliance" CSA (Cloud Alliance). As a member of the Alliance, Lenovo will work with the front-line mainstream cloud security manufacturers at home and abroad to promote cloud security and cloud computing related information and knowledge exchange, in the cloud computing environment for consumers and suppliers to provide the best security solutions. Cloud Security Alliance is the 2009 RSA Conference established by the Organization, once proposed that the industry widely recognized, is a cross-sectoral, cross-regional international exchange and cooperation platform. Join the league threshold ...

CA buys cloud computing security maker accelerates cloth cloud security

Since the new technology concept of cloud technology has been put forward, network security has been shuffled by cloud computing security. Major product safety manufacturers have dabbled in cloud computing security, Beijing time September 1 morning news, according to foreign media reports, computer software enterprise CA Technologies (hereinafter referred to as CA) has signed an agreement to 200 million U.S. dollars to acquire cloud computing security vendors Arcot Bae. The CA expects the deal to end at the end of the second quarter of fiscal year 2011, possibly reducing its earnings in accordance with General Accounting Standards (GAAP), but making non-general accounting accurate ...

The biggest aspect of this RSA conference: Cloud Security

At the RSA conference in 2009, the security of cloud computing was the subject of anxiety and discussion among many manufacturers and academics, with a stark contrast between optimism in cloud computing and pessimism about cloud security. "Swamp Computing"-----RSA founder Ronald Rivest A word that profoundly reflects this sentiment. It should be said that the information security community has not yet been prepared to recognize, participate in and help cloud computing, even the basic framework for security protection under cloud computing. However, at the RSA convention in 2010, cloud Security became a well-deserved star. Whether RSA total ...

Panda safe to carry out experience activities free to broadcast cloud security products

Recently, the panda released the "cloud Security hundred city thousands of award-winning experience", which is the panda safe re-enter the Chinese market after the latest release of large-scale user experience program. From now until July 31, users can choose to apply for a one-month test panda Safety Gateway through the Panda's safe channel partner, or test the "Panda safety Gateway +pcop" deadline. During this period, all users participating in the experience will receive a set of panda cloud antivirus software (Panda Cloud Antivirus). Within 3 months after experiencing the purchase of the Panda security gateway users, ...

Cloud security technology has begun to bear fruit

Cloud security technology as a new generation of technology concepts, making the Internet security field has been a comprehensive impact, a wave of technology updates followed. More and more enterprises try and use cloud security technology, making Internet users form a powerful alliance of offense and defense. Faced with the network security revolution brought by cloud security technology, many manufacturers and experts have disputed the development and pros and cons of it. However, according to the survey, cloud security technology has begun to bear fruit. In the first half of 2010, the global Internet security environment has been comprehensively improved, which is an important milestone in the anti-virus industry. According to Rising "2010 first half of each other ...

75% of respondents said cloud computing is the key to low expectations cloud security

According to foreign reports, a joint survey by Symantec and Ponemon agencies shows that most companies lack three basic elements-programs, systems, and tools-to ensure that sensitive information stored in the mainframe is still safe from the cloud. "Cloud computing is a good tool for providing a lot of basic business services, but our survey found that companies are concerned about cloud security when it comes to sensitive corporate and personal information, and this trend is becoming increasingly apparent." Dr. Larry Ponemon, founder of the Ponemon agency, said. To do ...

Rising becomes "Cloud Security Alliance (CSA)" First Asian anti-virus member

Recently, rising company formally joined the "Cloud Security Alliance (Cloud)", became the "Cloud Security Alliance Member" qualified Asia's first anti-virus manufacturer. Previously, including Microsoft, Intel, Cisco, Symantec, Trend technology and other heavyweight manufacturers have joined the organization, they will work together with the rising cloud security and cloud computing in various fields of application, for consumers and suppliers to provide the best security solutions. 498) this.width=498 ' OnMouseWheel = ' javasc ...

CSA Cloud Security Alliance China Division will be formally established

September 2, 2010 afternoon, CSA Cloud Security Alliance China Branch was announced in Beijing today. NSFocus as host, will be well-known domestic and foreign operators, friends, users gathered in a hall. An innovative technical discussion conference was opened. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border=0 alt= ' "src=" http://images ....

Seven Sins of revealing cloud safety

According to the IDG Group's Computerworld website, security experts say companies that choose cloud computing may be familiar with the concepts of multiple leases (multi-tenancy, where multiple companies host their data and business processes in the same server group of SaaS Services) and virtualization, But that does not mean they fully understand the security of cloud computing. Cloud Security Alliance (CSA) executive Director Jim Reavis believes that cloud computing is actually a combination of technologies to create an application with a unique management system. This is the new computer age ...

The International Cloud Security Alliance China will establish a communication and share construction industry chain

September 2, NSFocus held a summit of Cloud Security Alliance (CSA) Forum and China division in Beijing. The conference to "Communication and sharing, cooperation and mutual benefit" as the theme, the spirit of "introduction, go Out" the spiritual, explore the essence of cloud security and development trends, the exchange of cloud computing and cloud security at home and abroad the latest research results, to share the practical experience of cloud security applications. Dave Cullinane, president of the International Cloud Security Alliance, was invited to attend the summit and make keynote speeches. Dave Cullinane In his speech about the achievements of the Cloud Security alliance, Yunan ...

Cloud security Service Small-scale start Christie new business opportunities

While cloud computing's performance in saving resources and improving efficiency has been praised, its innate security problems have become a major obstacle on the way forward, a problem that has aroused the attention of many people. "Maybe our name ' cloud computing ' is a mistake, because it's easy to feel interesting and safe," he said. But in fact, the network is full of threats and sinister, if we call it "swamp computing" may be more to let people have a correct understanding of it. "At the recent RSA2010 security conference, the famous information security expert RONALDL ...

The five blind spots of the secret cloud security

When I read various blogs, IT industry analytics, and media coverage, I found many conflicting points of view. Some authors consider cloud computing to be safer, while others emphasize new security challenges in particular. As the concept of "cloud" is still in its infancy, there are many plausible arguments everywhere. Here are the five cloud computing blind spots I hear most often: blind 1 infrastructure services (Infrastructure-as-a-service, IaaS) providers of virtual private "cloud" like the Enterprise Internal data Center security virtual Private ...

Sniper Cloud security CA Technologies launch IAM solution

Cloud computing has become a trend in the IT field, but as more security vulnerabilities are exposed, the future of cloud computing is fraught with anxiety and unease. Cloud computing services have freed companies from the shackles of hardware and software and infrastructure, and more and more companies are choosing to work online and store data online, and they have to face the grim fact that cyber attacks will also be centered on cloud computing within the next five years. 498) this.width=498 ' OnMouseWheel = ' javascript:return big ...

Jinshan Poison PA through oesis OK International certification cloud security kill soft again won the honor

Recently, the international authoritative software testing agency Opswat announced a new phase of oesis OK certification, in the international major anti-virus test to maintain the leading position of the Golden Hill antivirus software, with the latest product poison PA 2011--The world's first application of "Trusted Cloud Kill" anti-virus software, again to get the anti-virus class Oesis OK authentication. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' src= ' http ...

Trend Technology Cloud Security 3.0 Force Push Data Center cloud computing Platform Protection

July 22, Trend Technology officially announced the introduction of the trend technology cloud security technology core New Cloud Security 3.0 solution. Since the beginning of 2008, the trend of technology in the cloud security step has basically maintained a year to upgrade. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border=0 alt= ' "src=" http://images.51 ...

From the concept to the practice depth analysis operator and cloud security

At present, more and more market data are dispelling doubts about the "cloud" concept, and a growing number of successful deployment cases show that cloud computing is no longer a disembodied vapor floating overhead. Cloud-Based security services (cloud-based) are emerging, with more and more enterprise users becoming beneficiaries of cloud security services. Then, the domestic telecom operators in the cloud computing and cloud security, what unique insights and views, and what practice? This article is based on operator expert in CSA 2010 Cloud Security ...

Total Pages: 17 1 .... 10 11 12 13 14 .... 17 Go to: GO
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.