Tags: cloud*

14 bookmark(s) - Sort by: Date ↓ / Title /

  1. "The net messages in all of this –

    A vendor that takes information security this serious probably deserves to be instantly added to your short-list, provided they have the requisite skill and experience in the products and services you seek.
    There are likely substantial vendor due diligence and annual re-certification expenses you can save as well. If a vendor can pass the SOC 2 Type II audit, there is little you will review that will trip them up. They have endured far worse. Just ask for their SOC 2 Type II report and certification documentation, review it to ensure your own comfort, then check the “Exceeds Requirements” box, and move on to the next vendor to review.
    Yes, we are essentially saying that SOC 2 Type II vendors should be given a “free pass” (of sorts). Give them an explicit opportunity to strut their stuff in your RFP process. And, by no means was it FREE. It has cost them dearly, but they think earning your business and peace of mind is worth it."
    Tags: , , , , by dnorman (2018-11-16)
  2. "In short, you must be able to cover not only security of the cloud (the cloud provider’s infrastructure), but also security in the cloud (how you configure and use the cloud infrastructure and services, as well as your applications and data) and security outside of the cloud (your software development processes, user endpoint devices, training and awareness, etc.)"
    Tags: , , , by dnorman (2018-11-16)
  3. A new hosting option. Sub-50ms latency to Calgary. Canadian hosting (but by an american company). This could be handy. Need to get campus legal to look into it…
    Tags: , , , by dnorman (2016-12-09)
  4. digital humanities linux server sandbox
    Tags: , , , , by dnorman (2015-11-16)
  5. -
    Tags: , , by dnorman (2014-11-27)
  7. -
    Tags: , by dnorman (2014-01-23)
  8. -
    Tags: , , by dnorman (2013-08-13)
  9. Cloud computing can and does mean different things to different people. The common
    characteristics most interpretations share are on-demand scalability of highly available and
    reliable pooled computing resources, secure access to metered services from nearly anywhere,
    and displacement of data and services from inside to outside the organization. While aspects of
    these characteristics have been realized to a certain extent, cloud computing remains a work in
    progress. This publication provides an overview of the security and privacy challenges pertinent
    to public cloud computing and points out considerations organizations should take when
    outsourcing data, applications, and infrastructure to a public cloud environment.
    Tags: , , by dnorman (2013-02-20)
  10. -
    Tags: , , , by dnorman (2012-08-07)

Top of the page

First / Previous / Next / Last / Page 1 of 2 Linky linky...: tagged with "cloud"

About - Propulsed by SemanticScuttle