After quite a bit of work by Will Gragido, Daniel Molina, John Pirc, and Nick Selby the Blackhatonomics book is finally out. I was asked to serve as technical editor for this book though, I admit, the work required little editing.
About the book:
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of cybercrime is analyzed from the impact of multiple. Written by an exceptional author team, they take practical academic principles back them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.
Congrats to the authors and buy it here.
After spending days and weeks poring over the results of the CloudPassage 2012 Security and the Cloud survey, we have finally released the most interesting findings in an easy to reference infographic. With over 200 respondents across 50 unique industries, this was our most successful and engaging survey to date.
It should be of no surprise to anyone involved in IT or security operations and architecture that companies have big plans for public cloud. What may surprise you, however, is how quickly organizations plan to embrace public cloud for critical application deployment by this time next year. Based on the results of our survey, 4 out of 5 respondents claim to be using public cloud servers within their organization for a variety of critical business functions such as temporary workload, big data, hosting of e-commerce applications, media, internal development and testing and the deploying of both internal and external applications.
We also noticed that some concerns about public cloud security are beginning to fade. The multi-tenancy of infrastructure or applications, provider access to guest servers, and the lack of perimeter defenses or network controls have all significantly decreased since our 2011 survey.
Though concerns about security and compliance (or the perceived lack thereof) in addition to the loss of control remain high, concerns about technology maturity, deployment complexity, cost, and expertise required fall on the low side of the concern spectrum.
Perhaps the most reassuring result from the survey is that nearly 80% of respondents understand where the demarcation between end user and service provider security responsibility lies.
Without any further ado, please enjoy the infographic below that helps communicate the highlights of our findings. If you would like to talk to us about our methodology or findings, please reach out to Jennefer Traeger at press@cloudpassage.com to schedule a briefing.
Well, not all this week but at least some blog posts that I’ve had in my hopper to read.