Premium Content

Access "Big data creates cloudy security forecast"

Robert Richardson Published: 25 Feb 2013

Back in 2009, some researchers at Sensepost Security in South Africa decided to poke around in the security mechanisms of a couple of the major cloud providers. The results were presented at Black Hat and Defcon. The researchers set limits for themselves so that they didn’t run afoul of the law, but still managed to find some fairly amusing gotchas. They were nice about it and passed along their findings to the relevant cloud providers. And none of the security holes they uncovered resulted in major breaches or takedowns. Still, it made a skeptic out of me where cloud security was concerned. For a couple of years, my answer to “how do you secure the cloud?” was “it can’t be done.” I’m still pretty skeptical about cloud security. I’ve grudgingly come to recognize, however, that some pretty good work is going on, to make it possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud. Even if application security in the cloud isn’t yet ironclad, it’s increasingly attractive to use the cloud ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Threat intelligence and risk: Why cybersecurity hangs in the balance
    ISM_0614.png
    E-Zine

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Figuring out FIDO as the first products emerge
    ISM_0514.png
    E-Zine

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...