Five keys to consider when it comes to securing containers

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.
Read more

The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that..
Read more

Hybrid Cloud and the Modern Data Center – Is Your Organization Already There?

While data center consolidation has been trending in government and commercial spaces since the 1970s, new government initiatives and directives released recently have created a new sense of urgency: those who haven’t yet consolidated are now required to. Many organizations are now looking to the cloud to meet the requirements. Whether they know it or … Read More The post Hybrid Cloud and the Modern Data Center – Is Your Organization Already There? appeared first on The State of Security.
Read more

New S3 Encryption Feature, Is Amazon’s Encryption Move Enough?

You be the judge... Essentially, all are targeted at data-and-objects-at-rest, rather than in-motion (except, perhaps the new cross-region replication feature with KMS). Regardless, all of the annouced new features are welcome (in my currently rather jaded opinion). Now, if we can just overcome human error (not to mention blatant developer and data-owner lack-of-attention-to-detail, read about that here)... Default Encryption – You can now mandate that all objects in a bucket must be stored in encrypted form without having to construct a bucket policy that rejects objects that are not encrypted. Permission Checks – The S3 Console now displays a prominent indicator next to each S3 bucket that is publicly accessible. Cross-Region Replication ACL Overwrite – When you replicate objects across AWS accounts, you can now specify that the object gets a new ACL that gives full access to the destination account. Cross-Region Replication with KMS – You can now replicate objects that are encrypted with keys that are managed by AWS Key Management Service (KMS). Detailed Inventory Report – The S3 Inventory report now includes the encryption status of each object. The report itself can also be encrypted. - via Jeff Barr, writing at the AWS Blog And,...
Read more
Page 1 of 1312345...10...Last »