Posts Tagged ‘ Virtualization Security Podcast ’

SaaS Auditing: Knowing who did what

January 11, 2013
By
CloudComputing

Rightscale has been running into a problem with the simplest of auditing requirements: how to know when someone has logged in. This problem spans nearly all their 100s of SaaS providers used to run their business. Where is the ability to do SaaS Auditing?

Read more »

Virtualizing Business Critical Applications – Security and Compliance

January 10, 2013
By
VirtualizationSecurity

Virtualizing Business Critical Applications is often stopped either by the sudden involvement of security and compliance, a need to better understand, or a need to gain visibility into the underlying security of the virtual environment in order to build new security and compliance models.

Read more »

Cloud API: In-Security?

December 14, 2012
By
VirtualizationSecurity

The 12/13 Virtualization Security Podcast featured George Reese CTO on enStratus as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud…

Read more »

12 Step Program to Enter the Cloud

December 6, 2012
By
VirtualizationSecurity

On the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon's 12 step program for entering the cloud. This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed…

Read more »

Data in the Cloud: Does Information want to be Free?

November 16, 2012
By
CloudComputing

At a dinner party recently, I was asked "does information want to be free?" This question is based on information that exists within the cloud today or tomorrow: Data in the Cloud. It is an interesting question with a fairly ready answer. Information is Power, it is people not information that controls information. Granted we…

Read more »

Defense in Depth: Hardware Security

October 24, 2012
By
VirtualizationSecurity

On the last Virtualization Security podcast our guest was Robert Rounsavall, CEO of Trapezoid. Trapezoid is looking into how to alleviate supply chain security issues. In essence the security of the hardware. At many a presentation I have asked "do you trust the hardware and many times the answer is that they do another time…

Read more »

Gaining Visibility into The Cloud: Migration and Security

October 18, 2012
By
IaaSSec

On many a Virtualization Security Podcast I tend to mention that we need greater visibility into the cloud to judge whether Cloud Service Provider security measures are good enough. But why should we bother? I am not saying we should not be concerned about a cloud's security but that we should as tenants be concerned…

Read more »

Defense in Depth: Bromium vSentry for End User Computing

September 21, 2012
By
VirtualizationSecurity

On the 8/9 Virtualization Security podcast we continued our discussions on defense in depth with a look at end user computing devices, specifically laptops and end point desktops, with Simon Crosby, CTO of Bromium. While we did also discuss phones and tablets we were focused more on the technology preview that now is Bromium vSentry.…

Read more »

Defense in Depth: Authentication and Authorization

September 13, 2012
By
VirtualizationSecurity

On the 7/29 Virtualization Security podcast we continued our discussions on defense in depth. We discussed authentication and authorization with IdentityLogix. IdentityLogix provides a unique solution that correlates users and groups against VMware vSphere's own role based access control stores. In other words, IdentityLogix can identify if a user or group within active directory has…

Read more »

Featured Solutions