The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…
In programming language, there is a concept called Type Safety. Type safety means a set of rules that the language enforces to prevent type errors that a programmer may make, which may lead to unintended or unsafe access to memory. C and C++ are not type-safe languages as the programmer has an incredibly amount of latitude to mix up values and data types. Because of weak type rules, memory attacks…
Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…
I'm a cyclist. Not necessarily a very good one, but I can hold my own in the middle of the pack. On group rides you always have the person who locks into a gear and sticks with it. Their pedaling cadence slows on hills, speeds up on inclines, and they don't really shift a lot. It isn't overly efficient, especially compared to the pro-level riders who keep a constant cadence and work the shifter…
Most books about cloud computing are either extremely high-level quasi-marketing tomes (sometimes written by cloud vendors) about the myriad benefits of the cloud without any understanding of how to practically implement the technology under discussion. The other type of cloud books are highly technical references guides, that provide technical details, but for a limited audience. In Architecting…
For those interested in secure coding, Robert Seacord of CERT is one of the main sources on the topic. Some of the notable books he has authored are: Secure Coding in C and C++ Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices The CERT Oracle Secure Coding Standard for Java…
May seems to be a great infosec book month, as I just got 3 excellent new books. Full reviews to follow. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions – by Slava Gomzin The CERT C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems – by Robert Seacord Security without Obscurity: A Guide to Confidentiality, Authentication, and…
Enterprise IT virtualization is a multi-syllable way of saying "software in the cloud," and companies are finding that its benefits are real—but so are its challenges. The same selling points that attract users—budget savings, the convenience of working from anywhere, and the elimination of software service updates and incompatibilities—also create headaches for IT help desks and CIOs. The…
Gartner Fellow and analyst David Mitchell Smith wrote in his report Hype Cycle for Cloud Computing last year - that while clearly maturing and beyond the peak of inflated expectations, cloud computing continues to be one of the most hyped subjects in IT. The report is far from perfect, but it is accurate in the sense that while cloud computing is indeed ready for prime time, the hype with it…
With a title like Cloud Computing: Theory and Practice, this book sounds like it is a reference for a general audience, providing a general introduction to what cloud computing is all about. Author Dan Marinescu, Ph.D is a computer science professor at the University of Central Florida, and the book is written for the college level reader, who has a strong interest in cloud computing; combined…
Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info.
This document was retrieved from http://www.rsaconference.com/blogs on Mon, 23 Apr 2018 11:21:23 -0400.