Welcome!

Open Source Cloud Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz

Related Topics: Cloud Security

RSS Feed Item

Security, Virtualization and Global Floatability: Implications of data theft; ex-HP exec gets 10 yrs jail!

I have been talking about virtualization security for quite a while. My last speech in EMEA, Belgium 2008 specifically, at the Open Source Virtualization Conference, I mentioned this, see this picture and think about it. Think about it as a security expert, think about it as a CIO, think about it as a company lawyer and think about it as an employee!

Just give yourself a moment, look at this picture:



Now tell me what you see in it? Well lets ponder about it once again. My Real-Time consultations and observations across the globe tell me one thing. just like the iRobot movie line from the robots: " You will comply!" or even better yet: "Wanna spend you life in jail?". You will have to deal with several compliances when the IT and Business domains converge.

I have said it on several occasions. The consolidation is bound to continue. It will go on this time till we have reached an absolute state of meshed or mashup domains. There will be several disorders and there will be a lot of IP-bleed and leaks happening that may go unnoticed but some will find you and you will be found! Loo at this story of this ex-HP, ex- IBM exec who will have to go to jail for 10 years. Career totally ruined and obviously the ramifications of such indulgences of transiting employees/people is bound to create a lot of unrest within the industry.

So look at the wicked and mischevious activities that lurk in your heads and how virtualization makes it possible for you to do all the things so wickedly insane!

Now look at this picture and think again:




So you see we have loads of ground to cover with security. The market consolidation is not bound to stop. Economy will push SaaS, Clouds and other frameworks in your face. Your data will eventually be resting somewhere esle but someone or something needs to guard it. you need to understand that it is the internal threat and eventually the Globally dispersed and hard-to-locate threat that can eventually endanger and compromise your data. Your data! Can you imagine that!

Think about it or else you might have to deal with shame and disgrace of having to deal with something as unfortunate as this :


Malhotra now faces up to 10 years in jail and a $250,000 fine, after pleading guilty to a charge of stealing trade secrets.

“In the email message, Malhotra noted that knowledge of this information would help specific HP sales teams better understand their competitors’ goals as the teams determined pricing for prospective deals,” the attorney for the prosecution said.

HP fired Malhotra after they learned of the leak. “The activity with which Malhotra is charged was in direct violation of clear HP policies, including HP Standards of Business Conduct,” the company said in a statement.

“HP detected this activity, conducted an internal investigation, terminated Malhotra’s employment from HP, and reported the activity to appropriate enforcement agencies and to IBM,” it added.
Do you want a culprit within your firewall. do you know who s/he is? There is still time, secure your data center, virtual or not! When virtual, take it in your design as a default!

Start asking yourself the following:

  • Do I have a CERT?
  • Did I get my Virtual Infrastructure Assessed for security?
  • What is the state-of-health of my data center? Caan I get a physical of my data center?
  • Do we run IA within our organization to meet the compliance and other directives?


Welcome to the new age of mischief and hyper-aspiration

The visibility within your data center and also understanding the vulnerabilities within your data center will help you understand how to fix such issues. How can I control my Virtual Machines and alert against a typical SecurityMotion Breach? Do we have something like that. If this employee had just packed all that stuff including all other data, including confidential property and software with source code, into a virtual machines and just copied a copy of such a VM into his USB, he would have been safe. Email is dangerous but VM Steal is and can be disastrous!

People don't do it for money. If you do it for loads of money, you just get caught. People do it for all sorts of reasons and they are far more damaging for firms. Your DNA could leak out to a competitor, your LOB could go bust. Have you thought about it?

Global Economic Disruption and insecure VMs: Will terrorists attack our data centers?

The last time the 9/11 happened, it shifted and changed the world forever. In my latest issue of my Time magazine, I have heard that the global floatability (which we so fondly call globalization) is allowing a lot of younger, mischief-prone folks to go and attack the europe. I am nuts? No it is happening. While U.S and others are preparing for a " physical attack", there will be a "virtual attack". This virtual attack may result in a absolute disaster to global economy. Well you might not care about global economy, you certainly have to be assured of this: Your firm might be totally gone by then!"

So security is not just to protect yourself merely from outside baddies or inside sulkies, it is for that unmesurable blended-attack that may encompass both internal and external threats, and pose a totally new form of threat to your organization.

Beware and get a health check today!

Read the original blog entry...

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...