Welcome!

Jim Hansen

Subscribe to Jim Hansen: eMailAlertsEmail Alerts
Get Jim Hansen via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jim Hansen

Part 2: What You Need to Know About Hybrid Cloud Security In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we'll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand environment, which creates a new set of security challenges for organizations. Because cloud computing infrastructure is also dynamic and scalable, it changes more frequently and further complicates the security monitoring process. Because of these factors, many legacy security monitoring tools that were built for the ... (more)

Hybrid Cloud Security | @CloudExpo #SDN #AI #ML #Security #DataCenter

What You Need to Know About Hybrid Cloud Security Thanks to its many business benefits, cloud computing is becoming commonplace within organizations of all sizes. Historically, companies have struggled to determine which model - public or private - best met their needs. But of late, IT professionals are increasingly starting to realize that both public and private clouds can exist harmoniously within the same organization, and that, in many instances, a hybrid cloud model can actually be the most effective approach. RightScale's "2016 State of the Cloud Survey" found that hybrid... (more)

Hybrid Cloud Security: Part 3 | @CloudExpo #SDN #API #SaaS #Cybersecurity

In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model, and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. In part two, we talked about the unique security challenges that are introduced by public cloud environments. In this third and final installment, we'll review why it's essential to approach hybrid cloud security with different methods, tools and best practices than those used in the data center. Bridging the Silo Between On... (more)