Last August, the Cloud Security Alliance (CSA) announced a registration project at the Black Hat security conference in Las Vegas, which the Cloud security Alliance hopes will enable cloud users to easily assess and compare the security controls of cloud vendors. But so far, only three companies have submitted their cloud security data, making the registration project very limited. The security, trust and Assurance Registration project ("STAR") is designed to evaluate the safety features of shipping vendors using a 170-point questionnaire, and end users can then view these assessments. In the Cloud Security alliance announces s ...
Is cloud services secure? Many people do not dare to attempt cloud computing and cloud storage because psychologically it is not reliable to store their vital information in a third party. This is actually like the report we often see, some old too save a few years of money put in bed by a mouse chewing, the professional thing or let professionals to deal with better, Cloud security issues require more attention. It is undeniable that the current cloud service providers are good and bad, but if even Amazon such services are unreliable, then cloud services are really doomed. This is not, recently Amazon has gained the trust of the US government, its ...
Companies are becoming increasingly aware of the benefits of cloud computing, both in terms of increasing the efficiency of resource utilization and saving the overall cost of IT investment. And cloud security is also mentioned as unprecedented heights, when it migrated to the cloud, the enterprise needs to consider the basic security countermeasures, this article will introduce you to 10 basic cloud computing security techniques. 1, to confirm the existing basic control is the core of the enterprise security concept. They contain nearly 60 security controls that protect your enterprise's most important assets. They focus on ensuring that cloud technology is applied to your business and that your operations are consistent with ...
For the Common market target, two competitors, though not cooperating, have indeed stood in the same trenches. November 1, 2011, the Second Cloud Security Alliance (CSA) Summit Forum was held as scheduled, it is noteworthy that NSFocus and Venus Chen Two direct competition friends became the Forum's Joint undertaker. Safe Spring cloud computing will be the key technology that affects the entire IT industry over the next 10 years, and cloud security is critical to the success of cloud computing. If cloud computing is the spring of the IT industry, that cloud security is the spring of the security industry. ...
"Cloud computing security, high-end CIO Summit" and 2011 Enterprise Cloud Computing and Virtualization security policy launch August 24 in Beijing. Dong Baoqing, the director of the Ministry of Industry, said at the summit, "cloud security" must attach great importance, if there is no "cloud security" protection, the development of cloud computing, will let everyone lose confidence. The following is a transcript of Dong Baoqing: Dong Baoqing: Thank you Moderator, distinguished chairman of Ming Zheng, you entrepreneurs, you CIO friends, Good morning! I am very pleased to be invited to the summit today. First of all, I would like to represent the Ministry of Industry, information Promotion Department ...
"Surging" to describe the concept of "cloud computing" in today's heat is not too, using "Yunshan" to describe the concept of "cloud computing" in the reality of the state is not too. "Cloud computing" was officially slogan by a young Google engineer in 2006 and has now sparked a "cloud" boom around the world. "Cloud" further triggered the "clouds security", in the surging behind, "cloud security" problem is more attention. While cloud computing provides value for the enterprise, it also consumes the cloud services, including the public cloud, the private cloud, and the hybrid cloud ...
Bright Net: Everybody is good! Here is the interview between the Bright net, now in my side is from the net of the president of the Dubun, Du, hello! Dubun: Hello! NET of the president of the Dubun received the Light Network interview (internship Guibos/photo) Bright Net: you first introduce your site is which field? Dubun: Net ya, our name is network servant girl means, we are mainly E-commerce third party management, this year the net YA split into two companies, one is to continue to engage in the field of E-commerce outsourcing and Third-party hosting. Two is a company ...
Clearly, software as a service (SaaS) continues to grow and is accepted by business and home users. According to Gartner's announcement in July 2011, SaaS revenues reached $10 billion trillion in 2010 and are growing. In fact, Gartner estimates that it will grow more than 20% in 2011 years and come to 12.1 billion dollars. According to Gartner's definition of SaaS, Software "is owned, provided and managed remotely by one or more vendors." Vendor through common program code and data set ...
The idea that the cloud would be a safe disaster has sparked a big stir in the industry, said Cisco's President Chambers. In fact, this is not sensational, data protection, terminal protection, virtual environment, risk management and other information security issues with the advent of cloud computing will be more complex and difficult, enterprise users of information security will face more serious challenges. Trend Technology 2010 Report on security threats points out that while cloud computing and virtualization can deliver considerable benefits and save a lot of costs, migrating servers to traditional information security boundaries also expands ...
Perhaps your organization has adopted some form of cloud computing it deployment. It may be a private cloud within an enterprise that hosts an e-mail package or a service other than it (such as Salesforce.com). Cloud computing already has the conditions to deploy, but it is also a matter of concern how businesses can safely use this it resource. It is not difficult to imagine a newer technology that can lead to more security dilemmas, and we have recently been able to see media coverage of hacking news. However, if we look closely at recent events, it is not difficult to see this fear ...
Some of the most important risk lists for public cloud computing are broad and complex, such as the Cloud Security Alliance's 1.0 edition of the important risks of cloud computing. Most risk lists contain the following items: 1, network security from the point of view of IT managers, this one is still the first to take the lead. This article also includes some data protection and privacy subcategories, from the physical security and application security of software that is a service provider (SaaS), as well as over advertising leaks. Steve MacLellan is a senior in the Financial Services Enterprise Architecture of the Boston Fidelity Technology Group.
The advent of "lead" cloud computing has changed the business model, allowing people to enjoy the infrastructure resources they need at a more affordable price, like water, electricity and coal. However, for users, how many people are willing to accept this service mode? According to the survey, enterprise users have been able to accept the private cloud, but when converting these enterprise users to individual users, they begin to become hesitant to face the public cloud. Undoubtedly, cloud security has become the biggest "stumbling block" to cloud computing, how to break this bottleneck? Symantec China President Wu Xiyuan recently accepted the "Communication production ...
Perhaps one day, cloud security vendors and cloud service providers will convince corporate CIOs that they can move corporate security-sensitive data and key programs from private clouds to public-sector platforms, but unfortunately, that day is far from over. Ubuntu 11.10 (Oneiric Ocelot) is officially released, this is the 15th major release of Ubuntu, desktop and server editions have a 18-month lifecycle. Ubuntu 11.10 includes the following versions: Desktop Edition, Server Edition, Ubunt ...
Perhaps one day, cloud security vendors and cloud service providers will convince corporate CIOs that they can move corporate security-sensitive data and key programs from private clouds to public-sector platforms, but unfortunately, that day is far from over. The information security practitioners, consultants and analysts interviewed by the author said that cloud security vendors and cloud service providers have a long way to go in the application of enterprise informatization, and they need to provide a convenient and secure public cloud space for enterprise customers before the mixed deployment of public and private cloud. The public cloud security problem has become the key to the global enterprise Informatization transformation.
The most tempting point of cloud computing is that end users can access the cloud in any access way and enjoy the rich application and fast computing power of the cloud. Among them, the use of mobile access security issues are becoming the focus of attention. Recently, the author interviewed the Network Kang Science and technology product Director Shaomin, understand its latest application of security gateway products NS-ASG to the enterprise private cloud mobile Access security protection. Shaomin Technology product director Next generation VPN traditional internet era, mobile access ...
Recently, China independent Security software Evaluation laboratory PCSL released the latest Security software evaluation report, "PCSL security software 0day virus Test-October 2011 report", the report for the first time using a 0DAY virus sample set and cumulative test two new test parameters, Most of the commercial security software that claims cloud protection is underperforming, highlighting cloud security vulnerabilities. The report shows that in the first scan of the 0DAY virus sample set, all the security software based on the signature engine, the virus recognition rate of less than 40%, installed with unknown virus engine ...
November 2-3rd, the RSA General Assembly Information Security International Forum held in Beijing for the second time, Dave Asprey, vice president of trend Technology cloud security, explained the relationship between cloud computing security and virtualization in an interview with CNET reporter. Dave Asprey points out that cloud or infrastructure based services, or software-based services, and so on, are all virtualized to achieve, often through virtualization to form the cloud. Of course, the security of the cloud is not only the security of virtualization, but also related to the data in the middle of the cloud, which will be through the encryption side ...
Today, cloud computing is a fire, but the cloud security problem has become a barrier in people's hearts. The Forresterresearch survey showed that 51% small and medium-sized enterprises have not yet used cloud services because of security. In addition, worldwide, more than 90% of German and French business CIOs claim that security is a prerequisite for their adoption of cloud computing. 56% European CIOs Mark cloud computing security as extremely challenging. "Ensuring data security is fundamental to the implementation of the cloud computing environment." "If security is not enough, it's in the clouds ..." said the chief technology officer of a small IT company.
The API key, like the SSL key, is the top priority in security policy. Many people verbally say they want to protect the information in the cloud, but in fact we are all stones in cloud security. Most organizations use some form of API key to access cloud services. The protection of these API keys is important. This article will discuss the issue of protecting API key and recommend some solutions. In the 2011, the importance of API keys was gradually recognized, and companies were more aware of their full protection of these keys. After all, API keys and access to sensitive information in the cloud have ...
With the increasing complexity of the Internet environment, the information security is threatened, and the anti-virus software will not be able to deal with the increasing malicious programs effectively in the future. Cloud security application, not only can identify and killing local hard disk virus library, but rely on a large network services, real-time collection, analysis and processing network security problems. The Alibaba community Cloud offers two cloud security solutions: Cloud Shield and cloud authentication code. Yun Dun is the Aliyun Internet Content Security Defense product, provides the entire network application based on cloud computing technology the Content security Defense solution ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.