I've been asked quite a few times, "when will it be a good time to get into
cloud computing?" by potential clients. My answer is typically it depends...
I know, I know.... not much direction there, but really it all depends. Why ?
Well, some may state, "we all know of the much beaten security concerns, and
we will ensure that systems on our end are secured and synced to work in
tandem with the vendors' security."
Can one ensure some degree of monitoring by the implementation of an
Intrusion Detection System (IDS) residing within the system hosting the
gateway into the cloud?
The intent of such an implementation can be to monitor the cloud gateway
system's software for anomalies, variances from expected traffic and quantity
of access into an enterprise's cloud service.But will it be effective enough?
We all remember the buzz and the alarm over adopting the cloud that ... (more)
As the cacophony of cloud evangelism expands into several areas of industry,
one much talked about aspect is that of the private cloud.
But what really is a private cloud, and once within an organization's
security perimeter is such a system a pure cloud computing ecosystem? (Of
course within the security perimeter - IT Security teams again have the
advantage of control in lieu of that in a public cloud.) Bear in mind though
once you start thinking of access from outside your "private cloud" the whole
security dynamic will change. At this point your cloud security
perimeter beco... (more)
Cloud Computing offers a sense of "vastness" in terms of storage and remote
processing. According to Simpson Garfinkil, a major challenge to any digital
forensics investigator investigating data within the cloud; can be an
inability to locate or identify data or code that is lost when single data
structures are split into elements.
This in effect directly impacts forensic visibility.
Within this ecosystem a major concern can be access to and the preservation
of data within an on-going digital forensic investigation. Of consideration
as mentioned in Part 1 - is that in a live and ... (more)
With the advent of Web 2.0 and onward, the rise of the terminology and
concept we call Cloud Computing, coupled with an increase in the manner
technologies are being used, not only by corporations but by individuals as
well, comes an increased drive to ensure that risk is managed, effective
security measures to protect identities are implemented, and efforts are
expended to ensure privacy is maintained.
A few years ago, in their quest to implement and maximize on the benefits of
Service-Oriented Architecture (SOA), researchers at Microsoft separated SOA
into four areas (1) viz.
[Adopted from my BLOG December 2009]
Lately in the IT community all the hype is on Cloud Computing. We have small
start-ups offering several variations of Cloud services as well as some of
the established big players (Google, Amazon, IBM, Novell (aimed at cloud
service providers),Sun) stepping up their offerings of cloud services.
But what exactly is Cloud Computing? Is it Virtualization? Is it services
that we accessed via a web browser over the years, something totally new, or
is it all of these,but just rebranded?
The term Cloud Computing started gaining traction when Google a... (more)