We cannot attribute the beginning of cloud computing to a particular person or time. It evolved with the evolution of Internet and enterprise computing. We may be able to trace its roots all the way back when Dr. Larry Roberts developed the ARPANET in 1969. (Whitman & Mattord, 2016) While the evolution of ARPANET, to Ethernet… Continue reading Cloud Computing and Data Security
Tag: Cloud Computing
Risk Based Authentication
The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or not is called risk based authentication. Traditional username and password along with information such as who the user is, from where the user is logging… Continue reading Risk Based Authentication
How Virtual Private Networks Work
How Stuff Works.com has put up a great tutorial in layman’s language on how VPN work – http://computer.howstuffworks.com/vpn.htm
Security Must Haves in a SaaS Provider
The past year was a learning curve on Cloud Computing, especially on SaaS providers. More and more ASPs are coming back rebranded as SaaS provider. As a security practitioner, it would be good to have a must have check list that we need to use to assess them. I prepared the following must have check… Continue reading Security Must Haves in a SaaS Provider
ASP to SaaS
A discussion on business model transition from ASP to SaaS
Saas as a Strategy
Should we adopt SaaS as a Strategy? A discussion.
Difference between SaaS and ASP
An objective comparison between Application Service Provider (ASP) and Software as a Service (SaaS)
The Open Group Security Practitioners Conference Day 2
Proceedings from the The Open Group Security Practitioners Conference at Toronto – July 23, 2009.
The Open Group Security Practitioners Conference Day 1
Proceedings from the The Open Group Security Practitioners Conference at Toronto – July 22, 2009.
Chrome OS, Cloud Computing and Privacy
Shaheen’s thoughts on upcoming Google Chrome OS; how does it relate to Cloud Computing and Privacy concerns.