Cloud Computing

Cloud Computing / Recently Commented

Internet Infrastructure Coalition (i2Coalition) Joins M3AAWG to Reduce Hosting Industry Abuse

The Internet Infrastructure Coalition (i2Coalition) has joined the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) to continue efforts on developing best practices for hosting and cloud service companies as well as sharing other information that will protect end-users. more

Pulling the Trump Card on Cloud and SDN

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) have been picking up the pace as of late. A high percentage of communication service providers and large data centers have either added these technologies on their roadmaps, or are already doing small-scale Proof-of-Concepts (PoC) in their testbed environments. more

Moving to the Cloud? Tips for a Soft Landing

Companies are no longer afraid of the cloud. Big talk about security and performance issues has dwindled to small voices as enterprises and SMBs alike adopt cloud services to empower their global impact. Big cloud benefits, however -- agility, scalability and on-demand access -- are the result of a thoughtful, well-planned move from on-site servers to off-site resources. Here are four key tips for a soft cloud landing. more

People Should Drive Automation - Not Technology

Service providers have traditionally organised their operations around different technology domains. The responsible teams have been staffed with specialists looking after routing, network services, security and various other functional areas. Over time, organizations like this have had the tendency to transform into loosely tied silos with limited interaction between the different teams. more

Which Way Does Your Data Flow?

Data may be moving to the cloud, but understanding the physical geography underlying the cloud is becoming increasingly critical. October's decision by the European Court of Justice, striking down key portions of the Safe Harbor rules that some companies had relied on to legally transfer personal data between Europe and the U.S., was only the latest example of the regulatory uncertainty involved in cross-border data flows. While Internet companies have begun to address challenges at the static geographic points where data is resident, understanding the actual paths that data travels is an important and sometimes overlooked part of the compliance analysis. more

Public Cloud Services in Mature Asia/Pacific Region to Reach $7.4 Billion in 2015

The public cloud services market in the mature Asia/Pacific (AP) region is on pace to grow 8.7 percent in 2015 to total $7.3 billion, up from $6.7 billion in 2014, according to new research from Gartner. more

Future Network Forum to Be Held in Nanjing in December 2015

Between December 10th and 11th 2015, the China Future Network Development and Innovation Forum, jointly hosted by the Chinese Academy of Engineering and the Nanjing Municipal Government, is scheduled to be held in Nanjing, Jiangsu, China. The forum will be jointly organized by Jiangsu Future Networks Innovation Institute and Beijing Internet Institute, with the theme of "Building future network test facilities and promoting network development & innovation", and it will invite nearly a hundred industrial experts at home and abroad, to establish a platform marked by security, innovation, openness, cooperation where the policy, industry, academics, and application are integrated. more

Watch Live Oct 1 - Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More

On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! more

Tips for Managing Your Company’s Shadow IT Issues

Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

Why Small Businesses Should Start Trusting the Cloud (Reasons to Convince Your Boss)

For small businesses, effectively managing technology comes with a question: Is it better to outsource or stay in-house? Most small and midsize companies can't afford to employ teams of full-time IT staffers. This creates a desire for outsourced solutions. However, opting for a third party means giving up a measure of control. What is best for your business? In this post, we offer a quick rundown of the top five tasks any small business should consider outsourcing. more

Cloud Versus Dedicated Data Centers: Rumble in the Virtual Jungle

Cloud or dedicated? That's the question companies face each time they need new storage space or resources -- is it better to build local or host off site? Both tech segments are performing strongly, with the global data center blade server market to reach more than $15 billion by 2019 at a compound annual growth rate of 10.25 percent and cloud computing sitting on a $16 billion market that's only trending up thanks to increased public and hybrid adoption. In other words, it's virtual war: Who wins the battle? more

A Cynic’s View of 2015 Security Predictions - Part 2

Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more

Top Cloud Management Trends: Adopt or Incur the Risk

Your company can't ignore cloud computing: Some kind of distributed-access model is now necessary to tap global markets, manage big data and get access to best-in-class software. But with increased cloud adoption comes the issue of management, since it's no longer enough to simply spin up a cloud and hope for the best. Here are five of the top cloud management trends to watch this year -- and the risks of opting out. more

CircleID’s Top 10 Posts of 2014

Here we are with CircleID's annual roundup of top ten most popular posts featured during 2014 (based on overall readership). Congratulations to all the participants whose posts reached top readership and best wishes for 2015. more

Industry Updates

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Your Business In Europe: Understanding GDPR & Privacy Shield

i2Coalition to Host First Ever Smarter Internet Forum