Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device. (Read More)

We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Will Technology Be Our Ultimate Downfall?

CloudComputingQuestion of the day: Will technology end up being our ultimate downfall? In the not-so-distant past, I wrote a series of blog posts on the expectation of privacy with user device tracking. If you are interested, you can check them out here. Lately, there have been a few things in the news that make it worth writing another post in that series.

Continue reading Will Technology Be Our Ultimate Downfall?

Cloud Dependency: Ubiquitous Networking

CloudComputingUse of the cloud depends upon ubiquitous networking. And not just everywhere, but extremely high speed as well. This came to mind as I was sitting at the top of a mountain in a national park and heard someone ask Siri a question. Siri’s response was that the network was not in reach. This struck me as funny, then odd, then sent me down the path of ubiquitous networking. We are in the age of the Internet of Things (IoT), and if we do not have a network, then IoT fails rather spectacularly. So, what are the real requirements for IoT?  Continue reading Cloud Dependency: Ubiquitous Networking

Are the Cloud Bambies Waking Up to Enterprise Requirements?

DataCenterVirtualizationGoogle has delivered live migration in its Google Compute Engine cloud offering. Now comes word from Barb Darrow at Gigaom that Amazon is working on live migration as well. Is it possible that the cloud bambies are waking up to the fact that not all applications are stateless and that for many applications, shutting down instances is simply unacceptable? Are the cloud bambies waking up to enterprise requirements for availability and performance management?

Continue reading Are the Cloud Bambies Waking Up to Enterprise Requirements?

Cloud Security: Different Approaches and Points of View

VirtualizationSecurityThere are two distinct points of view when discussing cloud security: the tenant’s point of view, and the cloud service provider’s point of view. Both of these points of view are legitimate, but often one is confused for the other, as we discuss our points of view without really clarifying. However, within each of these points of view are two distinctly different approaches to cloud security.

Continue reading Cloud Security: Different Approaches and Points of View

Supply Chain Security

VirtualizationSecurityThe recent spate of news out of Home Depot and, further back, Target point to the need for better supply chain security. But really, how can we address the issue? There are several answers, but none of them seem feasible in today’s IT environments. Why? They all require open communication, constructive criticism, and willingness to work toward a solution. However, what we find is that many IT organizations feel that anyone outside their immediate organization is suspect, security is the enemy, audit is also their enemy, and developers know all.  Continue reading Supply Chain Security