Bruce Schneier on security for cloud computing

Bruce Schneier on security for cloud computing

Bruce Schneier on security for cloud computing

Date: Apr 09, 2010

In part one of this interview with Bruce Schneier, he discusses the impending shift in how security will be delivered. Schneier expects security to be embedded in Web-based services and sold directly to service providers, rather than to enterprises and end users. This is a radical transformation for the security industry that security professionals must prepare for. Schneier also discusses consumerization and how traditional security technologies and services must adjust as more untrusted devices connect to trusted networks.

Watch part two of this interview: Bruce Schneier on cryptography and U.S. government infosec

More on Cloud Computing Security Issues: Incident Response - Data Breach Prevention

  • canderson

    Evaluating cloud logging and event management tools

    VIDEO - New cloud logging and event management products and services are emerging to help enterprises transition assets to the cloud, however finding the proper tool can be a challenge. Dave Shackleford offers hints to ease the process.
  • canderson

    CSA exec: Cloud defense demands intelligent security strategy

    VIDEO - Video: Cloud Security Alliance COO John Howie discusses the 'intelligent security' strategy necessary for cloud providers to defeat targeted attacks.
  • canderson

    Jim Lewis on cloud computing security issues

    VIDEO - In this video, Jim Lewis, Director and Senior Fellow at the Center for Strategic and International Studies, gives his views on the security impact of cloud computing.
  • Key steps to reducing the shadow cloud threat

    Tip - Though shadow cloud threatens enterprise security, there are ways to lessen the risks and protect organizations' systems and applications.
  • cloud computing

    Definition - Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud was inspired by the symbol that's often used to represent the Internet in flowcharts and diagrams.
  • Cloud discovery: Finding shadow cloud use in the enterprise

    Tip - Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage.
  • Collaboration with Cloud Computing

    Feature - In this excerpt of Collaboration with Cloud Computing, author Ric Messier outlines how enterprises can evaluate risk management in the cloud.
  • Addressing the most critical cloud security threats

    Tip - There are many security threats in cloud computing, but it's important for enterprises to understand at least the top risks. Expert Dejan Lukan reviews what to be aware of before migrating to the cloud.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: