September 27, 2012
SEATTLE, Sept. 26 — The Cloud Security Alliance (CSA) announced that its Security as a Service (SecaaS) Working Group has completed its peer review process and has published implementation guidance documents expanding upon their “Defined Categories of Service" document that was first made available in August of 2011. The Working Group’s Implementation Guidance now includes peer-reviewed documentation for each of the ten service categories that were defined in the previous version.
“The cloud presents organizations with a whole new set of challenges when it comes to assuring proper identity controls and access to privileged resources,” said Patrick Harding, CTO of Ping Identity. “The SecaaS implementation guidance being led by the CSA will go a long way to providing critical definitions across the industry and we are proud to be a sponsor of this important research.”
The first category being released today is on Identity and Access Management (IAM), providing a comprehensive set of controls for assured identities and access management. The IAM category is being sponsored by Courion Corporation, a leader in identity and access management (IAM) for access risk, and Ping Identity, The Cloud Identity Security LeaderTM. The remaining guidance documents will be presented at the CSA Summit at RSA Europe in London on October 8 and can be downloaded for free at: https://cloudsecurityalliance.org/research/secaas/#_downloads
“There is a great deal of excitement around providing Security as a Service but organizations need to make sure that the solutions being provided follow strong security guidelines,” said Dave Fowler, chief operating officer at Courion Corporation. “CSA’s SecaaS Working Group has done an exceptional job of defining the key security categories and incorporating feedback from domain experts across the security spectrum for this expanded version of implementation guidance.”
About the Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Source: Cloud Security Alliance
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
In this week's hand-picked assortment, researchers explore the path to more energy-efficient cloud datacenters, investigate new frameworks and runtime environments that are compatible with Windows Azure, and design a uniﬁed programming model for diverse data-intensive cloud computing paradigms.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
May 08, 2013 |
For engineers looking to leverage high-performance computing, the accessibility of a cloud-based approach is a powerful draw, but there are costs that may not be readily apparent.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.