Co-Authors: Dr. Wolf Zimmer / Otto-Sven Gliesche Everything in a cloud is at scale, resource admission, resource authentication and authorization, resource scheduling and availability and the use of inter-cloud resources. Cloud service providers deploy amounts of infrastructure to capture economies at scale. Thus, cloud security space is still evolving, as well as the technology to implement the clouds and it cannot be overlooked that cloud technology moves faster than cloud security.
Die Diskussion um IT-Sicherheit ist seit einigen Monaten geprägt von der Idee, “deutsche Kabel in deutscher Erde zu verbuddeln”. Auch wenn das nach Blut-und-Boden-Rhetorik klingt, ist diese Idee als psychologische Reaktion auf die Snowden-Enthüllungen verständlich. Leider erhöht sie unsere Sicherheit nicht, sondern gefährdet diese.
Co-Authors: Mario Berger, Dr. Jörg Apsel In order to develop software in a cost efficient way, today many companies outsource their software development departments to e.g. India. Which data will therefore typically be used for tests? Of course copies of the live data. Data Privacy issues will automatically occur and could lead to contraventions of law.
In 2014, the IT industry is transforming radically and with it our societies, and the business models of our clients: after the main frame age, the client-server age, we are now moving into the cloud age – the age of the always-on, ever-connected, Internet-of-things-driven, network society. I have just spent a few days in the US at the CSC Global Sales Conference and want to share my learning. At CSC, we have developed the concept of the outside-in enterprise to encapsulate that.
Authors: Otto-Sven Gliesche, Dr. Wolf Zimmer, Peter Rehäußer Cloud service providers entered the market with high scalability and functionality at low costs, but not many of them are aware of the increasing need for providing security and customer privacy. But, without any doubt the top concern of users wiling to enter the cloud, is security, last but not at least actually encouraged by the published exposures of espionage and information disclosure.