I've been asked quite a few times, "when will it be a good time to get into
cloud computing?" by potential clients. My answer is typically it depends...
I know, I know.... not much direction there, but really it all depends. Why ?
Well, some may state, "we all know of the much beaten security concerns, and
we will ensure that systems on our end are secured and synced to work in
tandem with the vendors' security."
Can one ensure some degree of monitoring by the implementation of an
Intrusion Detection System (IDS) residing within the system hosting the
gateway into the cloud?
The intent of such an implementation can be to monitor the cloud gateway
system's software for anomalies, variances from expected traffic and quantity
of access into an enterprise's cloud service.But will it be effective enough?
We all remember the buzz and the alarm over adopting the cloud that ... (more)
Over the last three weeks due to the nature of my IT security job, I have
traveled through major airports at least eight times.
With all the commotion recently regarding the airports new back-scatter X-ray
machines (privacy, health, etc.) I wanted a firsthand look/feel at this
experience. While I am sensitive to and an advocate for issues of privacy
regarding persons with medical conditions and children, at 15 pounds
overweight I don't think any airport security personnel will take
pleasure in looking at a scanned image of me. Far from it, I hope I don't
give them any nightmares... (more)
As mentioned in Part 1 of this article, one of my functions is to research
current and up and coming solutions within the technology realm, particularly
that of distributed computing and cloud computing.
It is a strong possibility that malicious users will eventually identify and
exploit potential flaws within the cloud computing model. CSPs, in their
pursuit to secure market share may have underestimated the possibilities of
attack and misuse of their cloud resources by a malicious user or users.
The likelihood that the creation, storage, processing and distribution of
illicit ... (more)
As stated in Part 1 my focus on this article will be more on the backscatter
technology as this seems to be where traveler scanning is heading and it
involves ionizing radiation. Currently we have varied opinions on this
technology with a major concern for the routine use of ionizing X-rays being
that of health issues.
Also mentioned was the fact that our skin being our largest organ, it may be
affected from backscatter skin surface scans in the long term. Continuing on
as stated earlier, per Wikipedia , there are three companies manufacturing
commercial backscatter X-ray dev... (more)
As the cacophony of cloud evangelism expands into several areas of industry,
one much talked about aspect is that of the private cloud.
But what really is a private cloud, and once within an organization's
security perimeter is such a system a pure cloud computing ecosystem? (Of
course within the security perimeter - IT Security teams again have the
advantage of control in lieu of that in a public cloud.) Bear in mind though
once you start thinking of access from outside your "private cloud" the whole
security dynamic will change. At this point your cloud security
perimeter beco... (more)