Amazon's latest security offering provides Amazon Web Services (AWS) customers with a separate appliance to securely store encryption keys, issue digital signatures, and manage cryptographic keys used for data encryption.
Cloud hosting and storage is increasingly popular, but many organizations are inadvertently exposing sensitive data stored in Amazon Simple Storage Service (S3) because of a simple configuration misstep.
Skyhigh Networks, a Cupertino, California-based startup offering cloud visibility and control solutions, on Monday emerged from stealth mode and officially launched its new solution designed to help enterprises know which cloud services their employees use.
Despite the fact that a majority of IT respondents say that their cloud deployments were successful, and have saved their respective organization money, many still do not trust the cloud with sensitive or personal information.
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.
What happens when a lack of control over the technologies on which trust is built means you can no longer trust them? Take a look, for example, at our reliance on cryptographic keys and digital certificates—technologies that were once thought of as intrinsically trustworthy.
Cloud bursting's ability to temporarily move or expand a workload that normally runs on a private cloud out to a public cloud is an easy thing to do, but when we start looking at the variety of hypervisors and management tools being used, things get murky.
When it comes to setting the standards for crucial internet functionality such as authentication, the Internet community must remain vigilant and carefully examine and scrutinize change proposals, to ensure they support the greater good of all of the Internet users.
There are various characteristics of the AWS model that we can extend to security -- the ability to leverage economies of scale for security analysis, or to work more closely with application developers to embrace their speed of innovation.