Bruce Schneier on security for cloud computing

Bruce Schneier on security for cloud computing

Bruce Schneier on security for cloud computing

Date: Apr 09, 2010

In part one of this interview with Bruce Schneier, he discusses the impending shift in how security will be delivered. Schneier expects security to be embedded in Web-based services and sold directly to service providers, rather than to enterprises and end users. This is a radical transformation for the security industry that security professionals must prepare for. Schneier also discusses consumerization and how traditional security technologies and services must adjust as more untrusted devices connect to trusted networks.

Watch part two of this interview: Bruce Schneier on cryptography and U.S. government infosec

More on Cloud Computing Security Issues: Incident Response - Data Breach Prevention

  • canderson

    Evaluating cloud logging and event management tools

    VIDEO - New cloud logging and event management products and services are emerging to help enterprises transition assets to the cloud, however finding the proper tool can be a challenge. Dave Shackleford offers hints to ease the process.
  • canderson

    CSA exec: Cloud defense demands intelligent security strategy

    VIDEO - Video: Cloud Security Alliance COO John Howie discusses the 'intelligent security' strategy necessary for cloud providers to defeat targeted attacks.
  • canderson

    Jim Lewis on cloud computing security issues

    VIDEO - In this video, Jim Lewis, Director and Senior Fellow at the Center for Strategic and International Studies, gives his views on the security impact of cloud computing.
  • cloud computing

    Definition - What is cloud computing? To understand cloud computing, examine public, private and hybrid cloud, as well as PaaS, SaaS and IaaS cloud models.
  • Cloud discovery: Finding shadow cloud use in the enterprise

    Tip - Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage.
  • Collaboration with Cloud Computing

    Feature - In this excerpt of Collaboration with Cloud Computing, author Ric Messier outlines how enterprises can evaluate risk management in the cloud.
  • Addressing the most critical cloud security threats

    Tip - There are many security threats in cloud computing, but it's important for enterprises to understand at least the top risks. Expert Dejan Lukan reviews what to be aware of before migrating to the cloud.
  • Evaluating cloud log and event management providers

    Podcast - Cloud providers are expanding their log and event management offerings to meet enterprise needs. Expert Dave Shackleford discusses the changes in the CSP marketplace and details five of today's vendors to consider during evaluation.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: