• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / security engineer

security engineer

10 things to think about with Cloud Computing and Forensics

10 things to think about with Cloud Computing and Forensics

By Dan Morrill on March 11, 2010

I was recently invited to write the first chapter of an upcoming book about cloud computing and computer/network forensics. While I am excited about being published, and of course you should go buy the book when it comes out Cloud Computing forensics needs to have a wider discussion in the information security field, as there […]

Posted in Design | Tagged cloud computing, forensics, Misc Technology, network, paradigm, process, security engineer, shift, thinking, virtualization | 1 Response

Seven Deadly Sins in Cloud Computing Security

Seven Deadly Sins in Cloud Computing Security

By Dan Morrill on March 4, 2010

A few days back the Cloud Security Alliance released their paper on the Seven Deadly Sins for Cloud Computing Security. This is a very good guide for security engineers to at least read. The more traditionally minded will ignore it, but those who are working in the cloud space, this gives us something to talk […]

Posted in Security | Tagged cloud, cloud computing, cloud security alliance, computing, csa, information security, infosec, Misc Technology, Security, security engineer, virtualization, VM | 1 Response

feed mail facebook twitter linkedin

Sponsor Posts

  • Entering a New Frontier: Artificial Intelligence and Machine Learning
salesforce com logo widget No feed items found. No feed items found.

Cloud Tweets

Tweets from @ZoliErdos/cloudave-widget

Popular Posts

  • AuthN, AuthZ and Gluecon
  • Home
  • The Five-Step Maturity Model for Building a Collaborative Organization
  • Why I am leaving Smugmug. Hint: it is not just about the money
  • Blog
  • Contact
  • Porn sites start using Facebook Connect
  • Turn your IPod, Iphone or soon the Ipad into a hacker system

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: