PRESENTED BY PALAPPLE

ADVERTISE WITH US

Posted by iPhoto.org - Feb 26, 2009

Advertise here in this prominent space for only $100 per month, your advertisement will appear in all of the post pages available across this website.
Check out the link about for more advertisement options provided, get your message across!

Advertise with Us

SNAPSHOCK IS COMING TO TOWN

Posted by iPhoto.org On Feb 26, 2009

You better watch out,
You better bookmark,
You better ready your pics, cos I'm tell you why...

Snapshock is coming to town!!

Snapshock

THE BEST PLACE FOR DRY SEAFOOD

Posted by StarryGift On Mar 20, 2009

全香港其中一間最具規模的海味網上專門店。專營零售燕窩、鮑魚、海參、魚翅、花膠、元貝、冬蟲草,極具食療價值。此外亦提供各項中藥海味烹調方法,以導出各食品的固本培元及補生之效。

客戶服務熱線:3158 1276
傳真熱線:3158 1416
電郵查詢:info@starrygift.com

海味軒 | 香港燕窩海味網上專門店


Friday, September 17, 2010

Cloud is a delight for hackers, says Novell

Stuart Sumner, Computing, Friday 17 September 2010 at 10:29:00




But an identity-infused enterprise might resolve the problem





An identity-infused enterprise, which would see a user's profile monitored by
every IT system they interface with in real time, is one way of tackling cloud
security problems, according to Brian Singer, senior solutions marketing manager
for security management at Novell.



Singer, who was speaking at the IDC Security Conference yesterday, added: "
This would make monitoring security in the cloud do-able. It would tell us who
the user is and what he is doing."



He went on to explain that without such a system, moving valuable data to the
cloud will make life easier for cybercriminals.



"The cloud is a delight for hackers," he said. "All the data is in the same
place, all they need to do is hack the cloud."



Monitoring of this sort would see an additional benefit coming from an
analysis of provisioning versus utilisation. If a user has access to a system
which the monitoring function proves they never use, their access privileges can
safely be removed. This improves both network security and regulatory
compliance.



Simon Young, general manager for server security at Trend Micro, agreed that
there are problems, and stated that once an organisation moves into the cloud,
traditional security does not exist.



Young suggested that encryption could be part of the answer. "You need to be
able to encrypt data in the cloud and keep sole control of the keys," he said.




Full story at http://www.computing.co.uk/computing/news/2269956/cloud-delight-hackers-novell

No comments:

Post a Comment



iPhoto.org facebook group
Advertise with Us