Jim Hansen

Subscribe to Jim Hansen: eMailAlertsEmail Alerts
Get Jim Hansen: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jim Hansen

In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model, and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. In part two, we talked about the unique security challenges that are introduced by public cloud environments. In this third and final installment, we'll review why it's essential to approach hybrid cloud security with different methods, tools and best practices than those used in the data center. Bridging the Silo Between On-Premises and Cloud Environments For today's resource-constrained IT teams, the explosion of public cloud services has only increased the complexity of securing critical infrastructure. Until recently, it has been a challenge for IT professionals to find security tools that are specifically de... (more)

Hybrid Cloud Security | @CloudExpo #SDN #AI #ML #Security #DataCenter

What You Need to Know About Hybrid Cloud Security Thanks to its many business benefits, cloud computing is becoming commonplace within organizations of all sizes. Historically, companies have struggled to determine which model - public or private - best met their needs. But of late, IT professionals are increasingly starting to realize that both public and private clouds can exist harmoniously within the same organization, and that, in many instances, a hybrid cloud model can actually be the most effective approach. RightScale's "2016 State of the Cloud Survey" found that hybrid... (more)

Hybrid Cloud Security | @CloudExpo #API #AI #Cloud #Security #Cybersecurity

Part 2: What You Need to Know About Hybrid Cloud Security In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we'll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand environment, which creates a... (more)