KML_FLASHEMBED_PROCESS_SCRIPT_CALLS

Posts Tagged ‘Security’

 

Security and Adaptability: Unlocking the Full Potential of Big Data and the Cloud

Tuesday, December 18th, 2012 by

Enthusiasm for and investment in Big Data and the Cloud is spurring innovation in a suite of new technologies that seek to transform information into knowledge at reduced costs. But the potential of Big Data and the Cloud is threatened by security, privacy, legal and regulatory constraints which prevent data integration and information sharing.

While the costs to capture, store and exploit data are declining, the costs of mishandling data are rising for every enterprise; and threaten to extend the data-poor environments in which we have long operated, forcing continued inferences and limits on data insights.

sqrrl_Oren

Technology leaders like Google,Facebook and Target have reshaped their industries using Big Data, but each is facing increased scrutiny over data handling. The result has created an atmosphere of concern and trepidation and has deterred many in the Fortune 1000 from embracing Big Data.

The relationship between Big Data security and Big Data innovation is not zero-sum, but rather they are mutually reinforcing concepts. Traditional data security approaches, which have proven inadequate, deal with disequilibrium by seeking counterbalance. In this case more security, more privacy, and more constraints lead to limited data access, continued fragmentation of data sets, and missed opportunities.

Instead of addressing these challenges as an afterthought or applying solutions around the edges, solutions that bake in and address security, privacy, legal and regulatory constraints from the onset enable new insights, while simultaneously building trust and transparency. Such a data-centric security model promotes adaptability and re-conceptualizes the relationship among data, users and applications and reduces administrative burdens and risks. Simultaneously it unlocks the potential for innovation and serves as a mechanism for supporting the integration of disparate data sets and for more complete information sharing.

(more…) «Security and Adaptability: Unlocking the Full Potential of Big Data and the Cloud»

Security Basics: 4 Steps to Tighten up Linux Security

Tuesday, November 20th, 2012 by

Our previous security articles from GoGrid discussed 5 steps to enhance your security on Microsoft Windows and how to tighten up Windows security. But what about making your Linux server security a bit more robust?

security-camera

Overview

Security studies strongly demonstrate that most systems will be attacked within 5 hours after becoming publicly accessible—in some cases, in less than 2 hours. The sources of the attacks are often unsuspecting users whose systems have been compromised by malware and are in turn being used to attack and infect other systems. The majority of attacks target two common threats:

  1. A combination of commonly used system accounts (e.g., the root account) with weak, dictionary-based passwords
  2. Systems that are missing critical or high-security vulnerabilities

Solution

This article provides GoGrid’s security recommendations for Cloud Servers running Linux. Perform these 4 steps in sequential order immediately after provisioning new GoGrid Cloud Servers to maintain the security (confidentiality + integrity + availability) of your system. (more…) «Security Basics: 4 Steps to Tighten up Linux Security»

A cloud is a cloud is a cloud

Friday, November 9th, 2012 by

There is no longer any doubt that the cloud is rapidly gaining momentum in the private sector as companies try to deploy technologies capable of enhancing efficiency without dramatically increasing expenses. While many decision-makers agree that cloud computing yields a number of benefits, the extent of these advantages often corresponds to which model is chosen: public, private or hybrid.

Cost reduction is usually one of the primary drivers for companies that move to the cloud, especially in today’s economic state. However, some cloud models may deliver greater opportunity for savings than others, and decision-makers need to balance the pros and cons of each option, according to a report by Virtual-Strategy Magazine.

A cloud is a cloud is a cloud

“A growing number of organizations worldwide are seeing the value of cloud computing as a way of increasing IT flexibility and lowering in-house infrastructure costs,” said Kyle MacDonald, cloud expert at Canonical, according to the news source. “However, achieving the right blend of security, control and cost efficiency depends on choosing the right public or private infrastructure – or the right balance of both.”

The private cloud
Security is one of the most controversial topics regarding the cloud, as many skeptics are unsure whether the hosted environment can keep confidential resources safe. For this reason, many companies responsible for managing highly sensitive information implement a private cloud structure, as IT departments can keep data and solutions within dedicated servers protected behind a specific firewall, Virtual-Strategy Magazine noted.

Furthermore, private clouds, unlike their public counterparts, only host a single tenant. As a result, decision-makers can customize the environments and even incorporate unique disaster recovery and business continuity strategies.

(more…) «A cloud is a cloud is a cloud»

Cloud security misconceptions impeding progress

Thursday, November 8th, 2012 by

Although the cloud is a major disruption to the IT landscape, it is not the first and it won’t be the last in this regard. With that being said, companies neglecting the cloud are likely falling behind rivals that have already adopted the technology, as the cloud promises to reduce IT expenses and enhance operations – both of which are critical in today’s unpredictable economy.

Even though these benefits are well known throughout the private sector, cloud computing adoption rates are not as high as they should be. Although there are several reasons for this, some have more of an impact than others.

Cloud security misconceptions impeding progress

Chris Weitz, a director at Deloitte Consulting, recently spoke with TechTarget and said that data security and privacy in the cloud are the leading inhibitors. This is largely because the cloud enables companies to extend their customer base, potentially reaching into previously untapped markets. At the same time, however, decision-makers are forced to deal with varying compliance regulations and privacy laws that can impede an organization’s progress.

“One huge problem, of course, is that data is not physically stored in any one computer in a cloud computing environment, it’s spread across thousands of them, so there’s no one physical place to check,” Weitz said. “It’s all done by software, and software by definition is not directly observable, so you need other software to observe that software.”

Keeping cloud environments protected
Just because security is a common concern in the cloud doesn’t mean decision-makers cannot take things into their own hands and protect the virtual environments. By learning about the technology and speaking with service providers, IT executives can guarantee their cloud services are safe enough to manage mission-critical information and applications.

According to a separate report by American Banker, executives need to speak with vendors and create a robust service-level agreement that guarantees multiple layers of security. In doing so, small and large businesses alike can leverage a cloud infrastructure with greater confidence and not worry about inadvertently exposing confidential information.

(more…) «Cloud security misconceptions impeding progress»

How To Tighten Up Windows Security

Thursday, October 25th, 2012 by

In the previous Security article from GoGrid, we outlined 5 Steps to enhance your security on Microsoft Windows. This article walks you through some of these steps.

vault

Step 1: Patch your system

The following steps apply to Microsoft Windows 2008 OS and Microsoft applications:

  1. Select the Start button
  2. Type “windows update” in the search area and press the Enter button.
    windows-update
  3. You should see the following screen:
    updates-available
  4. Select the Check for Updates option, which will connect to Microsoft to determine if your system requires security updates.
    check-for-updates
  5. Install security updates by pressing the Install updates button.
    Note: You may need to reboot your system immediately after you’ve applied the security updates.
    install-updates

Step 2: Rename the administrator account

The following steps apply to Microsoft Windows 2008: (more…) «How To Tighten Up Windows Security»