Amazon Snowmobile →
When you've got 100 Petabytes of data burning a big hole in your datacenter's front pocket, and you just have to import said data into Amazon S3 or Amazon Glacier storage... Whom - shall we say - are you going to call?
Oracle Announces Cloud Identity Management →
Meanwhile, in Better-Late-Tha-Never-News, there is a white paper to accompany the latest Oracle Corporation (NYSE: ORCL) announcement.
PhoneBoy, The Great Cloud Migration →
Repost of PhoneBoy's latest piece 'The Great Cloud Migration: Existential Threat or Opportunity?... Today's MustRead.
It's Cloudy Out There...
Chad Woolf, writing at the AWS Security Blog, announces the availability of the CIS AWS Foundation Benchmark. Outstanding.
Martinez, The Top Ten
CSA - Call for Volunteers
Good news from the Cloud Security Alliance - the organization has decided to begin work on Version 3 of it's eponymous Security Guidance for Critical Areas of Focus in Cloud Computing document, targeting 'critical areas of focus'. Hence the CSA Call for Volunteers, and the contracting of the Securosis team (comprised of Adrian Lane, Rich Mogull and Mike Rothman) for wordsmithing duty. Outstanding.
NIST CSD, ITL, CPP Slated to Host 8th Cloud Computing Forum →
NIST's Computer Security Division and the Information Technology Laboratory (ITL) along with the NIST Cloud Computing Program has announced hosting of the 8th Cloud Computing Forum and Workshop. Registration Information, etc. can be viewed here. Included with the announcement is the Call for Abstracts, noted below:
- Abstract Submission Deadline: May 15, 2015
- Abstracts Review Deadline: June 1, 2015
- Presentation Submission Deadline: July 1, 2015
Interested? Download the 8th Cloud Computing Forum and Workshop Abstract Submission form, additional information resides here.
Box Crypto, Key Conveyance →
Well now, this is good news [of coursepurely dependent upon where your place is within the transaction, and future issues of both key management and governance related challenges] as Box has commenced with provisioning customers with their encryption keys. Gotta admire the transfer of risk in this action, all under the guide of enterprise key management...
'Today, Box says it has a new product that gets the job done. Called “Enterprise Key Management (EKM),” the service puts encryption keys inside a customer’s own data center and in a special security module stored in an Amazon data center. The Box service still must access customer’s data in order to enable sharing and collaboration, but EKM makes sure that only happens when the customer wants it to, Box says.' ArsTechnica's Jon Brodkin