• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / information security

information security

Technology and Business Speed has Changed--So Must Identity and Access Management

Technology and Business Speed has Changed–So Must Identity and Access Management

By David Meyer on June 26, 2014

Compelled by competitive pressures and user demand, companies have embraced mobility and cloud. And even if companies haven’t embraced cloud, their employees have. Bring Your Own Device (BYOD) is now commonplace, and the average mobile worker carries an average of3.5 mobile devices, each accessing multiple applications that connect to protected corporate information, or that serve […]

Posted in Featured Posts, Security, Your POV | Tagged cloud, Identity and Access Management, information security, mobile, Security | 1 Response

In the fall out of Prism some things have really changed

In the fall out of Prism some things have really changed

By Dan Morrill on October 25, 2013

In the fall out of the NSA Government spying row a number of things have become readily apparent from both the business security viewpoint and the personal security viewpoint. From the Business Viewpoint we have landed firmly in the Catch 22 world, on one side we have government regulations that tell companies what they must […]

Posted in Featured Posts, Security | Tagged censorship, computer, Government, hacker, information security, law enforcement, Media and Web 2.0, monitoring, National Security Agency, NSA, prism, scary, spying, tv | 1 Response

Image credit: Defensetech.org

A cyberwar barely in the making

By Dan Morrill on March 13, 2013

We are asking China to stop poking at our networks; maybe we should take a look at what everyone else is doing along the way. An international framework is probably in order at this point. Many news systems are broadcasting that America is asking/telling China to stop hacking American Companies. While in testimony Army Gen. […]

Posted in Featured Posts, Trends & Concepts | Tagged china, cyberwar, information security, James Bond, United States, United States Cyber Command, US Cyber Command

Understanding Shodan HQ for hacking and cyber warfare

Understanding Shodan HQ for hacking and cyber warfare

By Dan Morrill on January 17, 2013

Understanding Shodan HQ for hacking and cyber warfare Shodan HQ is probably one of the more interesting web sites that few people know about. Shodan scans the internet looking for devices that people have left unsecured or with default if any login information. Sometimes a web site just makes you happy, and Shodan has shown […]

Posted in Security | Tagged Cyberwarfare, information security, SCADA, Security, Shodan

The Anonymous Press Release and Corporate Responsibility for Data

The Anonymous Press Release and Corporate Responsibility for Data

By Dan Morrill on May 9, 2011

I am not a member of Anonymous, but anyone in the information security field has followed them over the last 18 months as they grew from a general idea to launching DDoS attacks against corporations that did something they did not like, or like in the case of HBGary, did things that were ill advised. […]

Posted in Featured Posts, Infrastructure | Tagged Anonymous, Denial-of-service attack, hacker, information security, sony

Should instructors weed students out of programs based on ethics?

Should instructors weed students out of programs based on ethics?

By Dan Morrill on March 17, 2011

While the subject of teaching ethics is all the rage in business education, with many good ideas coming out of that realm, it might also be time to take a look at other professions that can stand to learn from what is happening in business schools. While my focus has been on information security, maybe […]

Posted in Trends & Concepts | Tagged education, Ethical code, ethics, information security

Seven Deadly Sins in Cloud Computing Security

Seven Deadly Sins in Cloud Computing Security

By Dan Morrill on March 4, 2010

A few days back the Cloud Security Alliance released their paper on the Seven Deadly Sins for Cloud Computing Security. This is a very good guide for security engineers to at least read. The more traditionally minded will ignore it, but those who are working in the cloud space, this gives us something to talk […]

Posted in Security | Tagged cloud, cloud computing, cloud security alliance, computing, csa, information security, infosec, Misc Technology, Security, security engineer, virtualization, VM | 1 Response

Lessons Learned from Cloud Camp Seattle 2010

Lessons Learned from Cloud Camp Seattle 2010

By Dan Morrill on February 4, 2010

Last night I got to attend cloud camp, which is an “unevent” that people can attend to meet up with people who are looking into a particular technology for business. Cloud Camp Seattle was held at the Grand Hyatt Seattle, which provided an awesome environment to discuss cloud computing with 200 of like-minded people. For […]

Posted in Security | Tagged architecture, cloud, cloud camp, cloud computing, computing, controls, Design, information security, Misc Technology, programming, seattle, software | 1 Response

How HP could give IBM a run for its money in Cloud Computing Security

By Dan Morrill on January 26, 2010

HP starts offering a unified Cloud and in local data center security package that aims to take on IBM directly. With the deals that HP has been making with Microsoft and using the skills and talents that came along with HP’s acquisition of EDS, this just might end up being an interesting race to the […]

Posted in Infrastructure, Security | Tagged azure, data, hp, IBM, information security, microsoft, Misc Technology, Security

Malware starts using Amazon EC2 as a Command and Control structure

By Dan Morrill on December 10, 2009

This is one of those things you wait for, like the other shoe to drop, but with the movement away from the data center to the cloud, it is an expectation that malware would follow the migration. There is no reason to think that your cloud applications are any more secure than any of the […]

Posted in Security | Tagged Amazon Web Services, aws, botnet, command and control, ec2, hacking, information security, Security, Trojan, zeus | 1 Response

feed mail facebook twitter linkedin

Popular Posts

  • Home
  • About
  • Nick Carr Thinks Google Makes Us Stupid But Google Thinks We Are Just Unconscious
  • What Makes an Entrepreneur? Four Letters: JFDI
  • How to Select Enterprise Collaboration Vendors
  • Cloud Computing in Education
  • The Feature Adoption Framework for Social Collaboration
  • MinuteDock Launches on Intuit’s Partner Platform

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: