Instrumented Interconnecteds Intelligent

Posted by
Steve Hamm in

Post feed

RSS 2.0

cloudEver since the term “cloud computing” was coined a few years back, the very thought of allowing a company’s data to sit out in some undisclosed location in cyberspace has left CIOs and CFOs quaking in their shoes. If they can’t control their data (or even know where it is) how can they protect it? Their worry is one of the main reasons why cloud computing is more talked about than actually adopted by businesses.

That’s why a claim by one of IBM’s security mavens, Harold Moss, chief technology officer of cloud computing strategy, seems so surprising. “There’s a misconception that cloud is less secure than traditional IT environments,” says Moss. “The cloud can actually be more secure.”

How is that possible? I’m sure some of you disagree with his conclusion, and I invite you to weigh in with comments…

Moss gives three reasons for his assessment:

1) When companies shift computing tasks to the cloud, they’re on guard. They make sure a good strategies and technologies are in place to protect their data.

2) They don’t just move everything at once and treat it all the same. The company, or the third-party cloud service provider, can set up a security regime that’s suitable for the applications they’re moving.

3) A third-party cloud service provider is likely to have superior security technology and expertise than does a company that’s just protecting its own data. That’s because it can spread the cost of security over a number of clients, while an individual company has to shoulder the entire burden itself. (This consideration is especially important in the case of small companies.)

The key to safeguarding data in the cloud, Moss says, is specialization. “One size doesn’t fit all. Not all clouds are the same,” he says. For instance, when IBM engineers designed the security for Lotus Live social networking and collaboration services, their focus was on giving users the maximum amount of control over who they share their information with and under what circumstances. The security considerations are quite different for an SAP financial application hosted in a cloud environment.

The idea that all clouds aren’t the same came to IBM gradually. In the early days of cloud computing, some of the industry pioneers painted the vision of vast data centers equipped with one kind of computer and running one kind of software. Everything would be treated the same. At IBM, the various business units pursued strategies aligned with the capabilities they offer and the needs of their clients. So they ended up producing differentiated cloud services–and different security schemes. “It sort of evolved that way. But it turns out it’s a good idea,” says Moss.

Is Moss right? Or is this a bunch of self-serving IBM marketing spin?

Bookmark and Share

Previous post

Next post

October 18, 2016
10:17 am

What’s up, of course this post is genuinely good and I have
learned lot of things from it concerning blogging.

Posted by: mimisol
October 4, 2016
11:29 am

Aw, this was a very good post. Spending some time and actual effort
to produce a good article… but what can I say… I put things off
a lot and never seem to get nearly anything done.

Posted by: Kenzo
April 2, 2016
5:15 pm

شكرا لك صديقي على الموضوع الجميل صراحة اعجبني واصل حبيبي في انتضار جديدك.

Posted by: al3ab tabkh
April 1, 2016
8:03 pm

Very nice article, exactly what I needed. Very useful post i really appreciate thanks for sharing such a nice post. I wanna thanks to a great extent for providing such informative and qualitative material therefore often. whatsapp status hindi

Posted by: whatsapp status hindi
May 9, 2015
6:07 am

You completed a few fine points there. I did a search on the subject and found nearly all persons will go along with with your blog.

Posted by: Monaco
December 3, 2014
4:58 am

Artificial baits include spoons, jigs, ribbon baits,
rattler baits & streamer baits. Connect “A’s” positive terminal to “B’s” negative terminal.
Freshwater fish can be placed in the live well on the boat, or on a stringer to keep
it alive until you are able to clean it.

Posted by: wooden deck railing designs
November 8, 2014
1:00 pm

You have made sopme really good points there. I looked on the web for more information about the issue
and found most people will go along with yoour views onn
this web site.

Posted by: click this link now
November 5, 2014
7:45 pm

However, HCG is most active when women become pregnant. naturally occurring hormone in the body, and
when it’s taken from higher doses it has been proven to
increase the bodys metabolic functions. This should become less frequent after the first week.

Posted by: dr oz
October 23, 2014
11:11 pm

Taking a home test first cuts medical costs significantly by weeding out the false calls.
This is the only way you will be sure that they are willing to stand
by their products. Since the 1950′s thousands and perhaps
even millions of people have tried the h – CG weight loss protocol and a good many swear by it.

Posted by: hcg levels
October 7, 2014
1:26 am

It’s available in either a red or navy striped pattern that is designed to help you flaunt your
figure. Locating the perfect wedding dress is
quite a activity, and going out with no idea will make it
even harder. But today, released on the newly installed in the
Miu Miu, first took the stage of the model, compared with Natasha Poly, is simply a ugly duckling.

Posted by: bandage prom dress boutiques
September 30, 2014
7:31 pm

Self tanning products can be used at home, or one can take professional help
by going to a salon. Taking this drug with coffee
or tea is not advised. Suede is less durable than other varieties
of Buffalo Leather and is cheaper because many pieces of suede can be split from a single piece of the hide.

Posted by: tan
September 25, 2014
5:40 pm

Trade transmission oil just about every 500 hours or
according to manufacturer. You will have to wrap your head throughout
the basic methods of search engine ranking and use it to your site that is if
you happen to be up for that task. These baits range from chicken blood to old moldy bread being used.

Posted by: deck box parts
September 24, 2014
4:41 am

The B5 Regimen is a treatment plan that utilizes Vitamin B5
to cure acne.    Once you are on the calorie restricted diet and when the body
demands energy, the HCG hormone will ensure that that energy is released from the stored fats and not from your lean muscle mass.
HCG diet materials stress the importance of sticking to this diet.

Posted by: hcg weight loss drops walmart
September 24, 2014
3:04 am

Simeon, someone who has devoted most of his life
finding cures for weight reduction. HCG injections are essentially meant to cause the effect of appetite inhibition, lowering calorie intake and, most importantly,
help break down fat stores in the body, resulting in easy
and fast weight loss. The area of the brain called the hypothalamus uses this hormone to manage fat stores for energy in order
to nourish the child, if the mum eat too few nutrients.

Posted by: hcg weight loss drops walmart
September 24, 2014
2:42 am

Excellent blog you’ve got here.. It’s hard to find excellent writing like yours nowadays.
I really appreciate individuals like you! Take care!!

Posted by: สร้างบ้าน
September 22, 2014
9:53 pm

Moisture may freeze at the expansion valve,
giving some of the indication of under charging. Our day always started by walking a mile to the fitness trail for an early morning jog.
Techniques Blue crabs are abundant all along the Jersey coast, in tidal
creeks and rivers and in shallow, saltwater bays, from
the Hudson River to Delaware Bay.

Posted by: wooden deck railing designs
September 8, 2014
9:20 pm

However, rhinoplasty can markedly improve your appearance
if you arent happy with the nose you have. The smaller molecular size of the Glycolic acid is precisely what makes its penetration better and potentially superior to
its fruit acid siblings. Change your appearance
in a better and attractive way by simply applying for cosmetic surgery loans.

Posted by: plastic surgery lancaster pa
August 31, 2014
8:55 pm

Quite a few treatment centers impose as per the time required each meeting.
Vitamin C is found in many foods, notably the citrus group.
There are a number of lasers used to remove locks like Ruby aesthetic laser,
Alexandrite laser, Pulsed diode array, Aragon aesthetic laser as well as

Posted by: Hair Growth Products For Men
August 29, 2014
8:43 pm

People have died on the operating room table even with
the best of care. However, apart from beauty purposes, nose jobs are also used to
correct problems that might have occurred due to a misshapen nose, such as breathing.
Information You Should Know About Plastic Surgery is another excellent instance of this.

Posted by: nose job korea
August 22, 2014
10:52 am

I had an old business plan for this, my brother had an idea similar, licensing a major brand like Starbucks which I think is the best one and calling it Jumping Java
or some other cool name. The consumer does need to be aware
these services are not free on Entune’ and will use a lot
of bandwidth on their smart phone. You want to make sure that the handsfree system you use will work with the interior design of your car.

Posted by: Pro Repair auto shop software
August 21, 2014
10:14 pm

Article Source: more information on how to regrow your hair check out
Total Hair Regrowth Review. Purchase shampoo or other hair care products that are
meant specifically for people with thinning hair.
We live in a climate that gets hot and humid and there are many activities to choose from.

Posted by: igrow hair rejuvenation system review
August 15, 2014
5:54 pm

After going through the various services offered and their respective rates and charges,
you can narrow down your list based on your budget and
choose the company that offers the best service.

Narrow down your choices to a maximum of three
companies based on their answers to your questions and your gut feeling.
After concluding your research you will get experienced, secure,
reliable, economical and quality moving service providers,
if a Packers Movers full fill your relocation needs and preferences you
can hire it for your shifting.

Posted by: local moving companies Houston tx
August 13, 2014
11:29 am

Now when it comes to the actually tweezing part, you want to make
sure that you’re using a good pair of tweezers. Hair fall is a condition of losing
hair from the scalp leading to the generation of new hair.
Alopecia areata is an inflammatory condition which can make
hair come out in patches or clumps.

Posted by: skin care products over 50
August 8, 2014
1:37 am

Despite the fact that grass skirts look great it’s not mandatory for your skirt to be made from grass.
If you are an artist, and would like to participate in an interview, please contact me.

But when this time comes around, insecurities start to pop out in even the
most confident of individuals.

Posted by: chloe sims african american ponytail hairstyles
August 1, 2014
10:06 pm

You can go to their websites and look for a listing
for the doctors you are considering. During your consultation visits,
ask potential plastic surgeons about the financing plans they offer.
By using a radio frequency face lift, many men and women can prolong the need for a full-fledged face lift later on in life.

Posted by: featured products & reviews
July 16, 2014
9:40 am

What a load of tosh. Thinking like this is going to get you into serious trouble. Flawed logic all over the place.

Posted by: ภาษาอังกฤษ
July 3, 2014
4:48 pm

Great post. I was checking constantly this blog and I am impressed!
Very useful info specifically the last part :
) I care for such information a lot. I was seeking
this particular info for a very long time. Thank you and good luck.

Posted by: michelle chamuel aspergers
June 27, 2014
2:00 pm

Greetings! Very helpful advice within this article!
It is the little changes that make the most important changes.
Many thanks for sharing!

Posted by:
June 25, 2014
9:42 pm

t�s exhausting to find educated people on this topic, however you sound like you understand what you�re speaking about! Thanks

Posted by: โหลดเกมส์ pc
May 21, 2014
12:23 am

People should include the glorious past within the best future and
move ahead with changing times. In fact, the first and
most important thing you should address in your campaign is your
family, which will end up being the most important factor in whether
or not you win on election day. After all, isn’t that what democracy is supposed to be.

Posted by:
May 17, 2014
5:06 am

Very descriptive article, I enjoyed that a lot. Will there be
a part 2?

Posted by: オロビアンコ 財布 新作
May 16, 2014
10:48 pm

Hello, yes this post is really good and I have learned lot of things from it regarding blogging.

Posted by: advertising on line
May 2, 2014
9:40 pm

Do you have a spam problem on this blog; I also am a blogger, and I was wondering your situation; many of us have created some nice
procedures and we are looking to swap solutions with
other folks, why not shoot me an e-mail if interested.

Posted by: jealousy quotes
April 23, 2014
3:10 pm

Hello it’s me, I am also visiting this web page
daily, this web page is truly good and the viewers are genuinely
sharing good thoughts.

Posted by: Hay Day Android Cheats
March 29, 2014
8:16 am

t provide a high conversion rate for each and every niche.
The drawback is that you can’t make any changes to the product.
But the condition is that the article should get approved by the sites.

Posted by: the easiest way to earn money
March 29, 2014
3:27 am

Heya i’m for the first time here. I came across this board and I find It truly
useful & it helped me out much. I hope to give something back and aid others like
you aided me.

Posted by: business electricity rates
March 12, 2014
12:56 am

Бързи заеми и всички видове бързи кредити
Сайт за бързи заеми и потребителски кредити в България
Пари назаем до 24 часа с бърз кредит
В този уеб сайт ще намерите списък
на фирми предлагащи бърз заем, в които получавате парите до
24 часа, предложения за бърз потребителски кредит над 399 лв, както и актуални промоции , списък с
офисите на компаниите по градове,
микрокредити за малкия бизнес,
удобен филтър за бързо намиране на
най-добрата оферта, калкулатор, услуги с изцяло онлайн процес за кандидатстване и взимане на
парите, полезна информация.

Posted by: дск ипотечен кредит
March 5, 2014
9:58 pm

I don’t know whether it’s just me or if perhaps everyone else encountering issues with your blog.
It looks like some of the written text in your content are
running off the screen. Can somebody else please comment and let me know if this is happening to them too?
This might be a issue with my internet browser because I’ve had
this happen previously. Thank you

Posted by: metal guitar tunings
January 10, 2014
5:00 am

Right here is the perfect blog for anyone who really wants to find out about this topic.
You understand a whole lot its almost hard to argue with you (not that I actually will need
to…HaHa). You certainly put a new spin on a subject which has been discussed for decades.
Great stuff, just great!

Posted by: buy pure garcinia cambogia
December 16, 2013
11:39 am

If you are going for finest contents like myself, simply pay a quick visit this web site
daily since it provides quality contents, thanks

Posted by: 6 derbyshire road
November 29, 2013
10:36 pm

Wonderful work! That is the type of info that are supposed to be shared across the internet. Disgrace on Google for now not positioning this submit upper! Come on over and talk over with my web site . Thank you =)

Posted by: Fashion Tips
October 2, 2013
6:40 am

When I initially commented I seem to have clicked the -Notify me when new
comments are added- checkbox and now whenever a
comment is added I recieve four emails with the same comment.
Perhaps there is a way you can remove me from that service?


Posted by: what to do before you get pregnant
August 23, 2013
7:34 am

Many business enterprises are transferring their tasks to the cloud environment because of the higher security offered by it.

Posted by: Chris Bao
August 7, 2013
3:00 am

I would like to thank you for the efforts you’ve put in writing this website. I’m hoping the same high-grade site post from you in the upcoming also. In fact your creative writing skills has inspired me to get my own web site now. Really the blogging is spreading its wings quickly. Your write up is a good example of it.

Posted by: Portable Projector
August 6, 2013
4:58 pm

Hello very cool blog!! Man .. Beautiful .. Amazing .. I’ll bookmark your web site and take the feeds also¡KI’m satisfied to search out so many helpful info here in the put up, we need develop extra strategies on this regard, thanks for sharing. . . . . .

Posted by: automobile cup holders
August 6, 2013
12:53 pm

Whats up very nice website!! Man .. Beautiful .. Superb .. I will bookmark your website and take the feeds also¡KI’m satisfied to search out a lot of helpful information right here within the publish, we want work out extra techniques on this regard, thanks for sharing. . . . . .

Posted by: automobile sun visor
August 1, 2013
9:40 pm

Great work! This is the kind of info that are supposed to be shared across the net. Disgrace on the seek engines for not positioning this post upper! Come on over and consult with my website . Thanks =)

Posted by: photography
August 1, 2013
1:07 am

I have been exploring for a little bit for any high quality articles or blog posts in this kind of area . Exploring in Yahoo I ultimately stumbled upon this website. Studying this information So i¡¦m glad to convey that I’ve an incredibly good uncanny feeling I came upon just what I needed. I most without a doubt will make sure to don¡¦t forget this website and give it a glance regularly.

Posted by: those web hosting
July 28, 2013
3:24 am

After research a number of of the blog posts on your website now, and I actually like your way of blogging. I bookmarked it to my bookmark website record and can be checking back soon. Pls take a look at my web site as nicely and let me know what you think.

Posted by: Mafalda Kieffer
July 28, 2013
3:09 am

There are some attention-grabbing cut-off dates in this article but I don�t know if I see all of them heart to heart. There may be some validity but I will take hold opinion until I look into it further. Good article , thanks and we wish more! Added to FeedBurner as well

Posted by: Mauricio Angeli
July 27, 2013
3:13 am

After examine a number of of the blog posts on your website now, and I really like your approach of blogging. I bookmarked it to my bookmark website record and might be checking back soon. Pls try my site as nicely and let me know what you think.

Posted by: Ted Fairfax
July 25, 2013
6:11 am

I�m impressed, I must say. Really rarely do I encounter a blog that�s both educative and entertaining, and let me tell you, you’ve got hit the nail on the head. Your idea is outstanding; the issue is something that not enough people are speaking intelligently about. I am very comfortable that I stumbled across this in my search for something relating to this.

Posted by: Milton Steff
July 19, 2013
3:42 am

It�s exhausting to find educated people on this topic, however you sound like you understand what you�re speaking about! Thanks

Posted by: Lowell Bercegeay
July 18, 2013
10:25 am

It�s arduous to search out educated folks on this subject, however you sound like you recognize what you�re speaking about! Thanks

Posted by: Asia Ana
May 6, 2013
6:13 pm

Any business that wants to send files securely with granular access rights should check out Thru.

My company uses it and it’s great.

Posted by: Keith
September 12, 2011
8:39 pm

Thanks a lot for giving everyone remarkably marvellous opportunity to discover important secrets from this site. It really is so cool and also full of a good time for me and my office fellow workers to search the blog the equivalent of three times weekly to study the new stuff you will have. Of course, I am just certainly contented with the powerful points you serve. Some 1 ideas in this article are really the most impressive we’ve ever had.

Posted by: judith ripka diamond sterling
June 26, 2011
3:11 am

We all have the same tract of thinking about the quote “its safer in an airplane than in a car! used HTC Touch Diamond 2

Posted by: michael04
April 21, 2011
1:58 pm

Cloud computing or solution lets you use files and applications over the Internet. It is amazingly secure,reliable and cost effective system..Cloud Office, Cloud Servers, Cloud Services, Cloud Hosting Cloud Storage Products , all this and more is GoKey..

Posted by: Cloud Computing
March 3, 2011
6:43 am

This assumes that “people (and companies) are basically good” which runs against normal IT security wisdom. Companies I’ve seen moving to the cloud are more interested in being on the bandwagon than “on guard.”
So far, there are enough real world examples counter to Moss’ arguments to make us think again about creating new ventures in security as we venture into the Cloud.

Posted by: Stan Stewart
March 3, 2011
5:03 am

What a load of tosh. Thinking like this is going to get you into serious trouble. Flawed logic all over the place.

Posted by: EtherealMind
February 28, 2011
6:50 pm

A very good and thought provoking topic. At this point, I think deploying important enterprise workloads into public clouds is ill-advised. There are security and availability concerns, of course, but also quality of service and cost goals that need to be met. Finally, the provider has to have some skin in the game.

I don’t necessarily buy the three reasons that Harold Moss uses to support his assertion that clouds can be more secure than traditional computing. I have more details on my own blog here….

Great conversation on this topic, thanks for writing it!

Posted by: Dan Olds
February 28, 2011
5:26 pm

I don’t believe that cloud based IT environments are inherently insecure or secure, nor do I believe that on-premise IT environments are inherently secure (a trawl of media around data breaches is testament to this).

The technology factors in this discussion are relevant, and interesting to me personally as well. What I think is sometimes worth discussing further is the ‘people’ aspect. For smaller companies the appeal of Cloud might be the ability to focus their team on their core business, in the same way that they might outsource some business processes. In some regions of the world, the availability of information security skills may mean that building an appropriate in-house security capability is not possible or cost-effective.

Posted by: Neil Readshaw (IBM Global Technology Services)
February 27, 2011
9:56 am

The comments about being in a plane as compared to a car really resonates with me. Most people do feel safer in a car, though the statistics prove that riding in a plane is safer than riding in a car.

A plane is driven by professional “drivers” and maybe folks need to reconsider the expertise provided by professional cloud “drivers” for their information processing needs.

Thanks for prompting a great discussion!

Posted by: Barry Ostrer
February 26, 2011
3:56 pm

Since cloud is about service delivery (and not technology) Moss’s statements should not come as a surprise – the capabilities of the service provider will align with what they are paid for in the market they choose to focus on. So while he said a service provider has the potential to be better at security (or other aspects of service delivery) the converse is also true – they can be worse. So choose your cliche’ – “caveat emptor” or “trust but verify” is still a part of the decision making process around use of service providers.

Posted by: Tim Durniak
February 26, 2011
2:29 pm

I applaud Joe Temple’s comment and will take it a step further. It IS about the client and the problem they are trying to solve. It is critical to keep several dimensions in mind when using the ephemeral term “cloud”. First, which deployment model are we talking about? There is a continuum from fully private (owned, managed, run on client’s floor) all the way to the fully public cloud (a la Amazon), with many stops and permutations in between. Second, which types of applications are we talking about? Absolutely business critical ranging all the way to “nice to have”? In IBM and with most clients we talk about this in terms of tiers. I usually suggest to clients that they might want to think twice about moving absolutely business critical all the way to a fully public cloud. Privacy/security is only one reason. There are a myriad of other considerations including integration with other applications and data, latency, network traffic, I/O, etc. However, it might be an interesting proposition to look at the lower tier of apps and consider them as candidates for one of the more public deployments. Again, privacy is only one of the considerations. The others are still important as well. That’s a long way of saying “it depends” when referring to the original post. For the most business critical environments, we might have substantial privacy and security barriers built around them so only the right people can access them for the right reasons. Those sorts of apps might be kept in a more private version of cloud (notice I didn’t say “private” as they could be in an off premises managed private cloud – remember the permutations of deployment models). However, if the tier 4 apps, which aren’t critical to the business and probably aren’t integrated with business critical apps or data, then the security/privacy concerns aren’t as significant. Does that mean the client would be comfortable putting these apps out in the ‘wild wild west’ with no protection? No! It means that, as with all things, there are levels of protection. Our enterprise cloud is protected by the same security and privacy standards that we apply to our own enterprise infrastructure. That is a high degree of protection, perhaps, in many cases, much more secure than some clients apply to their environments. So, in some cases, it is quite possibly true that the cloud is more secure. It just depends ….

Posted by: Julie Schuneman
February 26, 2011
1:47 pm

One of the ways I view the security of cloud services — like Evernote, one my favorite personal productivity tools — is the value of knowing that my notes and content, since its synchronized across laptop, mobile and the Web, is less in danger lost from a hard drive failure or misplaced device. I also tend to feel that services such as Dropbox, and others also have better backup and failsafe redundancies than I do as an individual.

That’s not to say that cloud-based services are less vulnerable to hacking or attack, but that there’s also nothing, as I see it, that makes them inherently more vulnerable that traditional IT.

Posted by: Jack Mason, IBM Global Business Services
February 25, 2011
8:47 pm

It’s the most secure resource already invented for all purposes found in our IT environment. But we need to take care about the infrastructure around it, the Broad Band connections are that reliable and stable in all world ? Seeing events like Egypt cutting internet access in a whole country leads us to re-think the concept of Grid and therefore Cloud-Grid.

Posted by: Gabriel Lodi
February 25, 2011
2:50 pm

Whats the waiting time to wait for a cloud reply(as compared to a normal system reply)–I mean with all the hand shakes and all that…and even then does it have to be routed back into DMZ(actually the MZ) to be verified(or cleansed) before it becomes the official reply?

Posted by: Dan Sweeney
February 25, 2011
2:03 pm

The key point Moss makes is that “one size does not fit all”. This is because there are different kinds of clouds.

I would add to this the thought that there are different kinds of clients. I have a sign in my office that says “It’s about the Client, stupid” We should think of a cloud implementation as a platform for running our solution. Then we choose the cloud platform over others based on its ability to match the requirements of the subject workload AS THE CLIENT WILL RUN IT. For some combinations of client, workload and platform alternatives the cloud configuration in question can indeed be more secure. For others not. Clouds are platforms and they should be chosen based on how they meet requirements imposed by “local factors”, which is to say which platform is most “fit for purpose”. Generalizations about “The cloud” as if it is a monolith ignore the fact that Clouds are platforms with some common capabilities but with very different capabilities. Generalizations about a particular cloud implementation removes our focus from where it should be: on the Client. Local factors rule.

Posted by: Joe Temple
February 25, 2011
12:56 pm

reminds me of this: you’re actually safer in an airplane than a car. But you’re not in control in plane. So you’re more scared.

Posted by: Michael Holmes
February 25, 2011
12:26 pm

From our Facebook page: Aditya Sharma comments: “At present cloud computing is not secure. Protocols are not enough to secure data in servers. But the power it offers is amazing.”

Posted by: Kevin Winterfield
February 25, 2011
12:25 pm

From our Facebook page: Sharad Kishore asks “What’s the waiting time to wait for a cloud reply–I mean the hand shakes and all that…and even then does it have to be routed back into DMZ to be verified?”

Posted by: Kevin Winterfield
February 25, 2011
12:24 pm

The cloud creates a single point of failure in an otherwise individual environment. Failures include corporate espionage, personal advancement, and all sorts of covert activity.
While the technology might be more impressive, the threat from within grows with the amount of sensitive data.

Posted by: Dan Mapes
6 Trackbacks
November 25, 2015
4:33 pm

[…] Support – IBM’s security maven, Harold Moss, chief technology officer of cloud computing strategy, […]

Posted by: Cloud Security Challenges | Pros & Cons of Cloud Computing - PortalGuard Authentication Blog
December 9, 2013
3:38 pm

[…] on cloud security, check out this Op Ed piece by Vivek Kundra, former CIO for the United States and this article weighing comments from […]

Posted by: Surprising Security Benefits of Cloud Computing | Techstar IT Solutions
October 18, 2013
5:32 pm

[…] own data center. The trigger was a statement attributed to IBM’s Harold Moss, reproduced in a blog post. Moss apparently said that “there’s a misconception that cloud is less secure than […]

Posted by: Today in Cloud — GigaOM Research
April 12, 2011
2:56 am

[...] this blog, IBM’er Steve Hamm lays out Moss’s case: “That’s why a claim by one of IBM’s security [...]

Posted by: The security debate can everyone be right? « Center for it-sikkerhed
February 25, 2011
1:56 pm

[...] This post was mentioned on Twitter by VISION Cloud Project, Amy Sammons Vogt. Amy Sammons Vogt said: Radical Thought: Cloud Computing Can be More Secure Than the Traditional Kind via @AddThis [...]

Posted by: Tweets that mention Radical Thought: Cloud Computing Can be More Secure Than the Traditional Kind | A Smarter Planet Blog --
February 25, 2011
12:16 pm

[...] This post was mentioned on Twitter by IBM SW Newsletter, Nelson Biagio Jr . Nelson Biagio Jr said: RT @IBMSWNewsletter: #smarterplanet blog #Radical Thought #CloudComputing Can be + Secure Than the Traditional Kind [...]

Posted by: Tweets that mention Radical Thought: Cloud Computing Can be More Secure Than the Traditional Kind | A Smarter Planet Blog --
7 Tweets
March 3, 2011
3:10 pm

RT @Cloud_Expert: How secure is cloud computing? The answer may surprise you: << no real world examples. Ouch.

Posted by: TechIsMidlName (Stan Tech Stewart)
March 3, 2011
11:30 am

How secure is cloud computing? The answer may surprise you:

Posted by: Cloud_expert (Jurgen Peters)
March 2, 2011
9:06 pm

RT @stevehamm31: How secure is cloud computing? The answer may surprise you:

Posted by: hans_brouwer (hans brouwer)
February 25, 2011
6:52 pm

@stevehamm31: How secure is cloud computing? The answer may surprise you:” surprisingly hawthornish.

Posted by: ppmthinking (Bruce Baron)
February 25, 2011
4:34 pm

RT @stevehamm31: How secure is cloud computing? The answer may surprise you:

Posted by: Molly_Antos (Molly Antos)
February 25, 2011
4:32 pm

RT @stevehamm31: How secure is cloud computing? The answer may surprise you:

Posted by: ibmsocbiz (IBM Social Business)
February 25, 2011
4:29 pm

How secure is cloud computing? The answer may surprise you:

Posted by: stevehamm31 (Steve Hamm)
Post a Comment