Virtualization & Cloud Security Ep 1

We are trying out a new format for the Virtualization & Cloud Security Podcast: video. We’ll post it up on YouTube as well as posting it via Talkshoe and iTunes. In this episode, Mike Foley (@mikefoley) of VMware Technical Marketing joins me to discuss IoT security, the RSA Conference, and hardening guides. We have spoken …

How Do You Data Protect?

In our ongoing quest to determine how our readers use cloud technologies, our second poll is now available: Which Type of Data Protection Service(s) Do You Use? This poll’s goal is to determine how data protection fits into your organization’s use of the cloud, if it does at all. There are many cloud-based tools for …

Distributed Cloud?

Distributed cloud service is a growing phenomenon. It fills several roles, distributing data for use by distributed applications, for data protection, and for other reasons. We have been seeing an increase in the number of distributed applications. Non-distributed applications lack the resiliency that is required to work within a cloud, whereas distributed workloads add a …

GPUs, Big Data, Security, and the IoT

At the GPU Technology Conference, NVIDIA CEO Jen-Hsun Huang and Tesla CEO Elon Musk talked about the security of a car. Musk stated that physical access is still required to hack most vehicles and that critical systems such as brakes and steering are segregated from the control display. This got me thinking about the security …

SDN: Sadly Defined Network

In virtual and cloud environments, network traffic often flows into a virtualization, then back out, forwarded to another device, usually security, before it re-enters the virtual environment. I call this a “sadly defined network,” not software-defined. Many of my colleagues claim that this is not true. They say that an SDN keeps east-west traffic within …