Monthly Archives: June 2015

The Myth of Cloud Insecurity (cont.)

Part 3 – Leaping the Chasm In my previous posts (Part 1, Part 2) in this series, we established the theory that the human species has come to rely on physical ownership and control of something as necessary and sometimes even sufficient … Continue reading

Posted in Cloud Computing Technology Insights, Uncategorized | Comments Off on The Myth of Cloud Insecurity (cont.)

The Myth of Cloud Insecurity (cont.)

Part 2 – Distributing the Security Perimeter In part 1 of this series,  we examined the fallacy that physical ownership and control of hardware, combined with multi-layered perimeter defense strategies, leads to the most secure IT deployments.  In the hyper-connected cloud era, … Continue reading

Posted in Cloud Computing Technology Insights | Comments Off on The Myth of Cloud Insecurity (cont.)

The Myth of Cloud Insecurity

Part 1 – The False Sense of Physical Security As is often the case when new paradigms are advanced, cloud computing as a viable method for sourcing information technology resources has met with many criticisms, ranging from doubts about the … Continue reading

Posted in Cloud Computing Technology Insights, Uncategorized | Comments Off on The Myth of Cloud Insecurity