There’s always more to learn, especially in IT, but we’ve done our best to clear up some of the confusion and anxiety around security in the cloud. Take a walk down memory lane with us as we recap the month’s highlights and guides from around the community.
- ITKnowledgeExchange community members cast their votes for favorite security blogs, and they’re worth a look.
- You didn’t have to attend this year’s RSA Conference to be able to appreciate the wisdom packed into some of these security professionals’ Twitter accounts.
- Whether you’re curious about cloud security or just plain lost, check out our Cloud Security Recommended Reading List for a jumping off point. Feel free to add your own picks and reviews!
Editorial Director Michael Morisy flew to hazy San Fransisco for RSA 2011. Check out some of his highlights:
- Oracle Database Firewall: A Babel Fish for SQL Sleazeballs
- At RSA 2011, Hacktivism is (again) a corporate threat
- The sneaky vulnerability that beat Coca-Cola’s HDD encryption and leaked the secret recipe
- Meet Rivest, Shamir and Adleman: The men behind RSA
- 5 takeaways from the Department of Defense’s Cyber Strategy 3.0
- Did iPhones make the desktop virtualization call easier?
Michael wasn’t the only one from our neck of the woods at the conference, so check out some other great blog posts from the West Coast festivities:
- RSA 2011: Does compliance inhibit security innovation?
- RSA 2011: Dan Kaminsky on the ROI of DNSSEC for enterprises
- Defense secretary outlines Pentagon cyber strategy
Open IT Forum
We’re never in want of a good discussion around ITKnowledgeExchange. Get to know your community by checking out members’ thoughts on some cloud security issues:
- Security Worst-Cases: Spadasoe, Fork92, Mpez0, CharlieBrowne, and Batye spill the beans on their firsthand experiences with security gone awry.
- What cloud concern do you need addressed?: Yeomanie, Sixball, and Ad2 share their reservations regarding cloud solutions.
- What are your cloud security concerns for 2011?: Batye, MicroAcres, and Rechil expressed concern about understanding normal processes such as backups and security in relation to the new technology.
Just because cloud security month has come to an end doesn’t mean that we’re not still dedicated to providing you with the know-how and necessary tools to navigate cloud computing. Keep posting those questions and discussions to forums and tagging them Cloud Security.