• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / Security

Security

What Can You Learn From Ring’s Astounding Success?

What Can You Learn From Ring’s Astounding Success?

By Mark Suster on April 20, 2018

Many people will write the history on why Ring became an enormously successful company and why it became a real-world unicorn in a world when many startups are anointed that merely on paper. Since I had a ringside seat to the company before it really existed all the way through the end I thought I’d […]

Posted in Business, Featured Posts | Tagged Internet of Things, Security

It’s Time For You To Make Security a Core Feature — Not a Tax

It’s Time For You To Make Security a Core Feature — Not a Tax

By Jason M. Lemkin on October 22, 2015

So many things have gotten better on the product side of SaaS in the past few years.  Amazing tools, the evolution of AWS as “enterprise grade”, so many great things. One thing I am less impressed with though is the evolution of SaaS security — application-level security, in particular. Let me give you two recent […]

Posted in Application Software, Featured Posts | Tagged Security

Technology and Business Speed has Changed--So Must Identity and Access Management

Technology and Business Speed has Changed–So Must Identity and Access Management

By David Meyer on June 26, 2014

Compelled by competitive pressures and user demand, companies have embraced mobility and cloud. And even if companies haven’t embraced cloud, their employees have. Bring Your Own Device (BYOD) is now commonplace, and the average mobile worker carries an average of3.5 mobile devices, each accessing multiple applications that connect to protected corporate information, or that serve […]

Posted in Featured Posts, Security, Your POV | Tagged cloud, Identity and Access Management, information security, mobile, Security | 1 Response

We Got Hacked, Now What?

We Got Hacked, Now What?

By Chirag Mehta on March 18, 2013

Hopefully you really have a good answer for this. Getting hacked is no longer a distant probability; it’s a harsh reality. The most recent incident was Evernote losing customer information including email addresses and passwords to a hacker. I’m an Evernote customer and I watched the drama unfold from the perspective of an end user. […]

Posted in Featured Posts, Security | Tagged evernote, hacking, Security | 1 Response

Is security that complicated

Is security that complicated

By Guest Authors on February 27, 2013

I recently had to set up an account with a US Government web site. I had a dickens of a time picking a password. They had amazing rules: The first character needed to be a number. The password had to have at least 7 characters, but no more than 12. Only lower-case letters could be […]

Posted in Featured Posts, Security | Tagged password, Security

Executive Order: Improving Critical Infrastructure Cybersecurity

Executive Order: Improving Critical Infrastructure Cybersecurity

By Dan Morrill on February 15, 2013

Heck, we wouldn’t be bloggers, and we wouldn’t care about our industry, cloud or information security if we didn’t spend time reading this executive order and seeing what hidden neat treats there are in there. Overall I am impressed with this executive order as it looks like someone actually thought about it in the first […]

Posted in Featured Posts, Security | Tagged Computer security, Critical infrastructure, Executive order, Security

Kim Dot Com's new Mega site has XSS Security Holes

Kim Dot Com’s new Mega site has XSS Security Holes

By Dan Morrill on January 22, 2013

Any new site, not just Mega is going to have security holes, and reports have surfaced in Twitter, Reddit, and over on ZDNet that Mega has a couple of persistent XSS security holes that are going to make users days a little bit harder. Beyond the crypto issues that you can read on ZDNet, persistent […]

Posted in Featured Posts, Security | Tagged Mega, Megaupload, Security

Understanding Shodan HQ for hacking and cyber warfare

Understanding Shodan HQ for hacking and cyber warfare

By Dan Morrill on January 17, 2013

Understanding Shodan HQ for hacking and cyber warfare Shodan HQ is probably one of the more interesting web sites that few people know about. Shodan scans the internet looking for devices that people have left unsecured or with default if any login information. Sometimes a web site just makes you happy, and Shodan has shown […]

Posted in Security | Tagged Cyberwarfare, information security, SCADA, Security, Shodan

Presentation: Cloud Security Management - Overview and Challenges

Presentation: Cloud Security Management – Overview and Challenges

By Ofir Nachmani on August 26, 2012

What’s your first priority cloud security concern ? From an attacker’s perspective, cloud providers aggregate access to many victims’ data into a single point of entry. As the cloud environments become more and more popular, they will increasingly become the focus of attacks. Some organizations think that liability can be outsourced, but no, it cannot! […]

Posted in Infrastructure, Security | Tagged Amazon Machine Image, Amazon Web Services, aws, cloud computing, data security, IT risk, Newvem, Security, Vulnerability (computing)

AppSense Trying To Make Personal Clouds Enterprise Worthy

AppSense Trying To Make Personal Clouds Enterprise Worthy

By Krishnan Subramanian on February 21, 2012

AppSense, the NewYork based company focussed on Virtualization solutions, today announced their research wing, AppSense Labs, focussed on bridging the gap between personal services and enterprise. They also announced their first product under AppSense Labs called DataLocker (iTunes link for iPad and iPhone). This got my attention for two reasons: As the so called consumerization […]

Posted in Security | Tagged appsense, briefs, cloud computing, cloud security, cloud storage, dropbox, enteprise, personal cloud, Security, sugarsync

Picture Credit: Techrepublic.com

Video: Cloud In The Eyes Of VCs

By Krishnan Subramanian on September 2, 2011

From time to time, we post videos from different vendors on their take about cloud marketplace. Below is a video of Okta CEO, Todd McKinnon, talking to two of their VCs Ben Horowitz (from Andreessen Horowitz) and David Weiden (from Khosla Ventures) about their take on where cloud is heading. While we take pride in […]

Posted in Trends & Concepts | Tagged cloud computing, cloud security, identity, okta, Security, VC, video | 1 Response

Verizon Acquires CloudSwitch To Beef Up Terremark Enterprise Cloud

Verizon Acquires CloudSwitch To Beef Up Terremark Enterprise Cloud

By Krishnan Subramanian on August 26, 2011

Verizon (previous CloudAve coverage) yesterday announced that they are acquiring CloudSwitch (previous CloudAve coverage), the Burlington based company founded in 2008 to make life easy for enterprises to extend their datacenter into the cloud, for an undisclosed sum. With this move, Verizon has made it even more clear that they are serious about the enterprise […]

Posted in Featured Posts, Infrastructure | Tagged cloud security, Cloudswitch, iaas, infrastructure, Infrastructure services, insights, Security, terremark, verizon | 2 Responses

What is Really Holding the Cloud Back?

What is Really Holding the Cloud Back?

By Raejeanne Skillern on July 18, 2011

As I was listening to speakers at Structure Conference this year, something caught my attention and changed my thinking on cloud priorities. When IT decision makers are asked to rate the top challenges for cloud adoption, security always rises to the top. Security, security, security. At Structure, I heard something slightly different from Microsoft’s Satya […]

Posted in Featured Posts, Infrastructure, Your POV | Tagged cloud computing, CloudComputing, intel, interoperability, open cloud, open data, open data center alliance, opennes, sctructure conference, Security | 6 Responses

Apigee Asks: Is Your API PCI Compliant?

Apigee Asks: Is Your API PCI Compliant?

By Krishnan Subramanian on June 30, 2011

Apigee (previous CloudAve coverage), the API management company formerly known as Sonoa Systems, yesterday launched PCI-Compliant API management solution in the cloud. As we move into an increasingly platform based world where APIs are the key, the next important issue we, as an industry, have to tackle is security. Already companies like Apigee, Mashery, etc […]

Posted in Featured Posts, Platforms | Tagged api, api compliance, api security, Apigee, APIs, compliance, insights, Mashery, paas, pci, pci-dss, platform services, Security | 2 Responses

VMware Horizon App Manager - A Quick Analysis

VMware Horizon App Manager – A Quick Analysis

By Krishnan Subramanian on May 17, 2011

Whether you want to call it consumerization of enterprises or democratization of IT, we know that it is happening already and no FUD can stop them anymore. Instead of fighting this process, today’s smart enterprises are embracing them by empowering their users to securely use SaaS and other consumer applications. VMware realized this trend and […]

Posted in Enterprise, Featured Posts | Tagged authentication, Chromebook, cloud applications, google, identity, insights, saas, Security, single sign on, sso, vmware, vmware horizon app manager | 1 Response

Next »
feed mail facebook twitter linkedin

Popular Posts

  • Home
  • The Five-Step Maturity Model for Building a Collaborative Organization
  • The Discriminatory Dark Side Of Big Data
  • Uncover latent needs with a simple question
  • Looking Back 2010: Key Cloud Acquisitions
  • From 24SevenOffice to 24SevenTravel and On to ...
  • Google Chrome OS: Pre-Announcement in Classic Microsoft-style
  • $25K … No, $100K… No, One Million Dollars to Charity by Atlassian

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: