Welcome!

Cloud Computing Trends

Greg Ness

Subscribe to Greg Ness: eMailAlertsEmail Alerts
Get Greg Ness via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Greg Ness

As nations and syndicates pursue their interests, they will become sponsors of offensive and defensive cyber capabilities, including information warfare, theft, and attacks designed to take down critical infrastructure. This could explain why–after billions in losses–there are no cyber treaties in place and attacks against election infrastructures are mere diplomatic affairs. Let’s face it. We […] ... (more)

Has FireEye Been Breached?

Am reading reports of a breach of FireEye. Stay tuned. While three outlets have covered, I’m awaiting acknowledgement from company officials.   Hackers Breach Cybersecurity Company In Apparent Revenge On Employee: Gizmodo http://gizmodo.com/hackers-breach-cybersecurity-company-in-apparent-reveng-1797397861 ==== PasteBin data dump: Hackers claim files are from Mandiant FireEye ‘breach’: The Register https://www.theregister.co.uk/2017/07/31/mandiant_fireeye_leak/ ==== Hackers claim ‘breach’ of cyber firm […] ... (more)

Death by Maintenance and Process Creep

Hardware-Defined IT is About to End- Not with a Bang but a Whimper After completing Security Paradox the idea of death by maintenance really sunk in. The following is a “song of vapor and iron” that has been echoing through my mind like an earworm: The Golden Age of IT As organizations grew they made […] ... (more)

The Big Shift to Software-Defined IT is Now Underway

A week ago I wrote about the recent AWS VMware partnership and how it threatens traditional IT vendors, practices and roles. The week before I talked about exploding security processes eroding protection at a Fortune 100 leader, based on a recent interview with a security architect. In May I said the cloud will crush the […] ... (more)

Can Clouds become Malware Super Spreaders?

In many ways and for most organizations the cloud is more secure than premises-bound security.  It’s easy to understand why: The most widely deployed IaaS architectures are more advanced than their traditional stack counterparts, many of which have been architected over decades based on changing priorities and user demands. Yet a recent and timely blog […] ... (more)