Security

Major factors impacting cloud security

Grazed from InformationAge. Author: Nick Ismail.

Companies that adopt cloud within their organisation can release products quicker, protect their customer data from security threats, and achieve economies of scale at a faster rate than companies with traditional IT environments. However, the shared nature of cloud computing also means that there is a real possibility that organisations could face security threats after they move to the cloud. This article will cover a few of the most common cloud security threats and explain what steps you can take to protect your business online.

Data breaches

Recent data breaches such as WannaCry and Petya have shown that the cloud isn’t completely immune to threats that traditional company networks face. Data breaches that involve sensitive company information is especially problematic for businesses, and can even lead to significant fines and lawsuits...

Read more from the source @ http://www.information-age.com/major-factors-impacting-cloud-security-123468244/

Google to reveal technical details of Titan security chip for cloud computing networks

Grazed from IndianExpress. Author: Editorial Staff.

Alphabet Inc’s Google this week will disclose technical details of its new Titan computer chip, an elaborate security feature for its cloud computing network that the company hopes will enable it to steal a march on Amazon.com Inc and Microsoft Corp. Titan is the size of a tiny stud earring that Google has installed in each of the many thousands of computer servers and network cards that populate its massive data centers that power Google’s cloud services.

Google is hoping Titan will help it carve out a bigger piece of the worldwide cloud computing market, which is forecast by Gartner to be worth nearly $50 billion. A Google spokeswoman said the company plans to disclose Titan’s technical details in a blog post on Thursday...

Read more from the source @ http://indianexpress.com/article/technology/tech-news-technology/google-touts-titan-security-chip-to-market-cloud-services-4809576/

Juniper SVP: Cloud Computing’s Next Wave Unifies Security and Connectivity

Grazed from SDXCentral. Author: Jessica Lyons Hardcastle.

Juniper Network’s security products have taken a backseat to its switches and routers over the past year as the company’s cloud business strategy continues to boost revenues. But as hyperscalers, telcos, and enterprises invest more in cloud data centers and architecture, they’ll need to beef up security — which makes cloud security a “very attractive market,” said Kevin Hutchins, SVP of strategy and product line management at Juniper.

Speaking at the 2017 Instinet Media and Telecom Conference, Hutchins acknowledged that Juniper’s security product performance “hasn’t been where we’d like it to be.” But, he added, there’s an opportunity to grow that portfolio. “Security is just going to become a key feature of how do you connect users to applications, applications to applications, regardless of where they are sitting,” Hutchins said...

Cloudistics Announces Enhanced Security in its Cloud Platform

Grazed from Cloudistics

Cloudistics, an enterprise hybrid cloud computing company, announced the release of the Cloudistics Spark Guardian Edition operating system, a new security hardened, highly compliant OS that meets the strictest government security standards as part of the new Cloudistics 3.2 release.

"Cloudistics is now hardened to exceed the security requirements for many of the advanced federal contracts that are mandating a move to shared multi-tenanted cloud infrastructures," said Pete Jackson, Director DOD and IC Sales at Three Wire Systems. "We are seeing a huge demand for next-generation cloud computing like Cloudistics to meet the performance demands of real-time threat detection and prevention applications."

The Cloudistics Spark Guardian Edition OS was designed for customers in highly compliant sectors such as government and commercial customers in healthcare, finance, and insurance that require higher level government standard compliance certifications.

Capsule8 Launches Beta Release of Industry's Only Threat Prevention and Response Platform for Cloud-Native Environments

Grazed from Capsule8

Capsule8 today launched the beta version of Capsule8 Protect, the industry's first threat prevention and response platform purpose-built for cloud-native environments. Capsule8 Protect brings continuous security to an enterprise's production environment, allowing them to detect and shut down attacks in the instant they happen. The company is conducting private demonstrations of its beta product at Black Hat USA from July 22-27.

Organizations are rapidly shifting toward containerized and microservice architectures. However, this explosive growth brings significant challenges that require solutions to simplify and automate complex security requirements for this next-generation infrastructure. Existing solutions such as security appliances, which rely on IP or host names for monitoring, simply don't work in the dynamic world of containers. Meanwhile container-focused security solutions provide some vulnerability scanning and threat alerting, but cannot protect large amounts of the legacy infrastructure or actually stop attacks from happening.
 

Backup and Sync from Google: Fight Ransomware Risk with Cloud Computing

Grazed from 1RedDrop. Author: Shudeep Chandrasekhar.

Google today launched a much-anticipated desktop app called Backup and Sync. Not one to mince words, the company is encouraging users to sync whatever media they have on their local systems to a location in the cloud. Essentially, it’s going to act as a replacement for older Drive client applications, as well as for the older Photos app.

The tool will be mindful of any existing settings you have on your Mac or PC for backups, but you can basically sign into your Google account and specify which folders need to be backed up regularly to Google Cloud. Not only does Backup and Sync keep your desktop backed up at all times, but it can also access and sync data from external memory devices like USB sticks, hard drives, cameras and SD cards...

Overcoming File Sharing, Healthcare App Cloud Security Concerns

Grazed from HealthITSecurity. Author: Editorial Staff.

Potential file sharing and healthcare cloud security risks must be addressed in covered entities’ and business associates’ risk analyses, according to the latest OCR cybersecurity newsletter. These collaboration tools can greatly benefit organizations, but the possible privacy and security risks cannot be ignored.

Risk management policies and business associate agreements (BAAs) should also review any file sharing or cloud computing options to ensure PHI security, OCR maintained. “Misconfigurations of file sharing and collaboration tools, as well as cloud computing services, are common issues that can result in the disclosure of sensitive data, including ePHI,” the newsletter stated...

A10 Networks Brings "Harmony" to Management of Secure Application Services Across Multiple Clouds and Data Centers

Grazed from A10 Networks

A10 Networks introduced a new strategic solution that offers multi-cloud, multi-service management that brings to life its ongoing vision of harmonizing application delivery and security.

The new developments center on the A10 Harmony Controller, built on microservices and container technologies, offering a multi-tenant, highly scalable controller architecture that incorporates real-time analytics at a per-app level and central management and orchestration of secure application services across hybrid environments - from physical data centers to public, private and hybrid clouds.

The new A10 Harmony Controller and analytics capabilities fundamentally change the way secure application services are delivered, protected, and managed. Because the A10 Harmony application delivery and security controller uniquely spans traditional data centers and clouds, it is now the industry's only controller-based platform that can deliver analytics, configuration and orchestration across such hybrid application environments.

Is the Cloud Safe for Hosting Images?

Have you ever heard the saying "ignorance is bliss"? Well, you can correctly assume that the phrase is even more relevant whenever you are speaking about online safety. It is very important that you, as an online user, are always aware and alert. So, if you have yet to jump on the cloud computing train, you may be wondering how safe and secure it is when it comes to storing data and images for your auction templates and other online activities.

The Basics of Cloud Computing

There is a high probability that you have been using cloud computing for a while without even knowing it. The cloud powers things like webmail for Yahoo and Google, social media sites, blogs, Google Docs, online gaming, and online storage.

How Cloud Call Centers Are Taking Steps to Improve on Security

We think of the Cloud as this wonderful way to store data and information that is then accessible to us any time, and in any place. Cloud applications are able to reach across all different industries and be used in unique ways. With that said, the Cloud isn't perfect, in fact security issues have become quite the topic where the Cloud is concerned. One area where that is particularly true is with Cloud call centers. It has led people to ask what steps are being taken by these call centers to improve upon security.

Call Centers - Nothing New

Call centers themselves are nothing new. These have been used for decades in order to provide customers and clients with support when needed and assistance when needed. The ability to talk to a live operator is attractive for many people.