Building Practical IGA in the Cloud Era (Richmond, September 26)
Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading
Cloud Security: Does it Have to Go the Hacker Way?
All too often, cloud service providers (CSPs) fail to follow a systematic, comprehensive approach to security as they create and update their service rapidly. Using agile development practices, they gain productivity, but often fail in security diligence – that is,… Continue reading
Cloud Security for IaaS: From Vision to Reality with a Trend Micro Case Study
Cloud computing a la infrastructure-as-a-service (IaaS) has this ephemeral quality. High scale, replicated, virtualized, fast. Automated orchestras of workloads and storage volumes of data moving, copying, cloning at Netflix speed. In the wrong hands, so goes your data, so goes… Continue reading
FireHost Founder Takes off the Gloves, Touts Enterprise-Grade Cloud Hosting
In a briefing at RSA Conference, FireHost CEO and Founder Chris Drake said his service was more secure than competitors’ and that this year he would take off the gloves to expose “the industry’s dirty little secret.”
Drake described… Continue reading
Drake described… Continue reading
Cloud Security: The Essential Question
“Cloud Computing: Who is in Control?” This was one of my all-time favorite posts from more than four years ago. Then at Burton Group, I’d become the cloud security analyst just as the technology industry, still reeling from the Great… Continue reading