Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device. (Read More)

We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Cloud Dependency: Visibility

CloudComputingWe have looked at the hidden dependencies around upgrades (Cloud Dependency: Automated Upgrades) as well as the hidden dependencies around networking (Cloud Dependency: Ubiquitous Networking). Now, we will look at the hidden dependencies on visibility. Or more to the point, the lack of visibility within the cloud. With regard to visibility, the question most often asked is, “Do we know what is happening behind the scenes within our tenancy?” Continue reading Cloud Dependency: Visibility

Cloud Dependency: Automated Upgrades

CloudComputingIn my last cloud dependency article, I reviewed the need for ubiquitous networking. In this article, I look at the need for automated upgrades. I do not mean the need for automation in general, but specifically the need to automate any upgrade or update behavior. There are two sides to every cloud story: what the tenant does and what the cloud service provider does. In both of these stories, there is a need for well-planned, automated upgrades. Also needed is very good documentation on how to upgrade if the automation fails or if there is no easy way to automate. Upgrades should be bulletproof. We trust, but verify.  Continue reading Cloud Dependency: Automated Upgrades

Will Technology Be Our Ultimate Downfall?

CloudComputingQuestion of the day: Will technology end up being our ultimate downfall? In the not-so-distant past, I wrote a series of blog posts on the expectation of privacy with user device tracking. If you are interested, you can check them out here. Lately, there have been a few things in the news that make it worth writing another post in that series.

Continue reading Will Technology Be Our Ultimate Downfall?

Cloud Dependency: Ubiquitous Networking

CloudComputingUse of the cloud depends upon ubiquitous networking. And not just everywhere, but extremely high speed as well. This came to mind as I was sitting at the top of a mountain in a national park and heard someone ask Siri a question. Siri’s response was that the network was not in reach. This struck me as funny, then odd, then sent me down the path of ubiquitous networking. We are in the age of the Internet of Things (IoT), and if we do not have a network, then IoT fails rather spectacularly. So, what are the real requirements for IoT?  Continue reading Cloud Dependency: Ubiquitous Networking

Are the Cloud Bambies Waking Up to Enterprise Requirements?

DataCenterVirtualizationGoogle has delivered live migration in its Google Compute Engine cloud offering. Now comes word from Barb Darrow at Gigaom that Amazon is working on live migration as well. Is it possible that the cloud bambies are waking up to the fact that not all applications are stateless and that for many applications, shutting down instances is simply unacceptable? Are the cloud bambies waking up to enterprise requirements for availability and performance management?

Continue reading Are the Cloud Bambies Waking Up to Enterprise Requirements?