Year: 2012

Blackhatonomics: An Inside Look at the Economics of Cybercrime – NOW AVAILABLE!

After quite a bit of work by Will Gragido, Daniel Molina, John Pirc, and Nick Selby the Blackhatonomics book is finally out. I was asked to serve as technical editor for this book though, I admit, the work required little editing.

About the book:

728670Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of cybercrime is analyzed from the impact of multiple. Written by an exceptional author team, they take practical academic principles back them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

Congrats to the authors and buy it here.

Infographic: Security and the Cloud 2012

After spending days and weeks poring over the results of the CloudPassage 2012 Security and the Cloud survey, we have finally released the most interesting findings in an easy to reference infographic. With over 200 respondents across 50 unique industries, this was our most successful and engaging survey to date.

It should be of no surprise to anyone involved in IT or security operations and architecture that companies have big plans for public cloud. What may surprise you, however, is how quickly organizations plan to embrace public cloud for critical application deployment by this time next year. Based on the results of our survey, 4 out of 5 respondents claim to be using public cloud servers within their organization for a variety of critical business functions such as temporary workload, big data, hosting of e-commerce applications, media, internal development and testing and the deploying of both internal and external applications.

We also noticed that some concerns about public cloud security are beginning to fade. The multi-tenancy of infrastructure or applications, provider access to guest servers, and the lack of perimeter defenses or network controls have all significantly decreased since our 2011 survey.

Though concerns about security and compliance (or the perceived lack thereof) in addition to the loss of control remain high, concerns about technology maturity, deployment complexity, cost, and expertise required fall on the low side of the concern spectrum.

Perhaps the most reassuring result from the survey is that nearly 80% of respondents understand where the demarcation between end user and service provider security responsibility lies.

Without any further ado, please enjoy the infographic below that helps communicate the highlights of our findings. If you would like to talk to us about our methodology or findings, please reach out to Jennefer Traeger at press@cloudpassage.com to schedule a briefing.

Security and the Cloud 2012 Infographic

Some interesting blog posts this week

Well, not all this week but at least some blog posts that I’ve had in my hopper to read.

  • FedEx CIO Sees Analytics Driving a World of Enterprise ChangeA pressing need to leverage massive amounts of Big Data in the name of business agility has put shipping giant Federal Express on the path toward re-engineering most of its enterprise applications.
  • A Buyer’s Guide to Cloud Apps InfographicCloud applications are becoming more popular and prominent than ever and they aren’t going anywhere. Working in the cloud makes sense as it allows for greater efficiency and easier collaboration. But before you make any purchases it certainly pays to do some research. Take the time to clearly understand how much you’re paying, what you’re paying for and pay close attention to what each service guarantees, they might make a bigger difference than you think. We created this infographic to help guide you through the process, enjoy!
  • PHP State of the Stack: A New Benchmarking ReportA sample of approximately 1,800 [New Relic] PHP customers to see what versions they are using, what frameworks they are on and what Drupal modules they’ve plugged in.
  • Thales: Sensitive data is now moving to the cloudEighty-two percent of firms would transfer sensitive data into the cloud, despite security fears, research suggests.
Scroll to top