For the last several years, and really ever since public repositories and storage were first used, API and other confidential data has been leaking. The treasure trove as the start of an attack is now becoming common place (most recently from Accenture, DXC Technology, and now the drone maker DJI). The treasure troves are either …
TVP Category Archives
Privacy: It Is Such a Personal Thing, Part 3
This is the third post in this series about privacy in the digital world. The first post centered on general concepts of privacy in the EU and the US; the second looked at a US citizen’s rights in this area. Today, we will examine the legal protections for Australians and New Zealanders.
No Need for Independent Clusters for Security or Compliance
On the latest Virtualization and Cloud Security Podcast (11/09/2017), senior technical marketing architect for vSphere Security Mike Foley and I discussed security and compliance, and segregated or independent clusters for each. This has been one of my personal hot topics for a while. The issue is that many folks think, rightly or wrongly, that a …
Continue reading “No Need for Independent Clusters for Security or Compliance”
Process, People, Ptechnology, and Politics
The four Ps of security, DevOps, Agile Cloud Development, and cloud migration are Process, People, Ptechnology, and Politics. In that order. The Ptechnology piece is by far the easiest piece, though it is often considered to be critical. Without Process and People, at this time, technology is just a bunch of 1s and 0s. Unfortunately, …
Continue reading “Process, People, Ptechnology, and Politics”
Whitelisting: What Is It Good For? Well, Actually Quite a Lot, Really
Whitelisting is the art of running just what you need, and no more.
Beyond Virtualization: Security within the Guest
The October 12, 2017 virtualization and cloud security podcast moved up the stack. In it, we discussed security within the guest operating system. This approach to security applies to clouds, virtualization, and physical systems. Unlike Software as a Service (SaaS), all other forms of infrastructure or platform involve an operating system you can control. That is …
Continue reading “Beyond Virtualization: Security within the Guest”