Nov2017

Companies Leave a Treasure Trove of Data

For the last several years, and really ever since public repositories and storage were first used, API and other confidential data has been leaking. The treasure trove as the start of an attack is now becoming common place (most recently …
Read More “Companies Leave a Treasure Trove of Data”

Nov2017

No Need for Independent Clusters for Security or Compliance

On the latest Virtualization and Cloud Security Podcast (11/09/2017), senior technical marketing architect for vSphere Security Mike Foley and I discussed security and compliance, and segregated or independent clusters for each. This has been one of my personal hot topics …
Read More “No Need for Independent Clusters for Security or Compliance”

Oct2017

Process, People, Ptechnology, and Politics

The four Ps of security, DevOps, Agile Cloud Development, and cloud migration are Process, People, Ptechnology, and Politics. In that order. The Ptechnology piece is by far the easiest piece, though it is often considered to be critical. Without Process …
Read More “Process, People, Ptechnology, and Politics”

Oct2017

Beyond Virtualization: Security within the Guest

The October 12, 2017 virtualization and cloud security podcast moved up the stack. In it, we discussed security within the guest operating system. This approach to security applies to clouds, virtualization, and physical systems. Unlike Software as a Service (SaaS), …
Read More “Beyond Virtualization: Security within the Guest”