Security

Chris Riley

Using Cloud Orchestration to Respond Quickly to Heartbleed

April 11th, 2014 | Author: | Filed under: Dev / Test | Tags: , , , , , , , ,


I wish I could say I found out about the Heartbleed bug very quickly and from some super deep technical source.  But I didn’t.  I found it on my favorite Tmblr blog, filled with animated gifs about DevOps that gets me through the day. And once I realized what this particular Gif was telling me, I too was in a small state of shock.

Read the rest of this entry »


Daniel Bakshi

Security in the Cloud!

January 9th, 2014 | Author: | Filed under: CloudShare, Demos & POCs, Dev / Test, Training | Tags: , ,


lock

So, you have decided to Develop/Test or run Demos/Training in the Cloud. That’s Great! That is the right choice. While we are all aware of the benefits of the Cloud. You now have to put your trust and data somewhere else. So it’s important that you feel safe there.

Read the rest of this entry »


Ilana Bercovitz

Demystifying the Cloud

April 9th, 2012 | Author: | Filed under: CloudShare, Demos & POCs, Dev / Test, Training | Tags: , , , , , , ,


People have a difficult time grasping the concept of the cloud. As many ways as I’ve tried to explain where I work to friends and family, I am often asked, “Can you please explain what ‘the cloud’ even is?” Read the rest of this entry »


Chris Riley

Is it secure?

March 26th, 2012 | Author: | Filed under: CloudShare | Tags: , , , , , , ,


Last week, I presented at the AIIM 2012 conference on the topic of “the cloud.” When it comes to the cloud, there is one issue that raises the most concern; the issue of security. My response to the common question, “Is the cloud secure?” is that security can no longer be used as an excuse to avoid the Cloud.  I’d like to tell you why.

Read the rest of this entry »


Avi Karnon

CloudShare Security Notification: Action Required – Critical Windows Remote Desktop Protocol Security Patch – MS12-020

March 20th, 2012 | Author: | Filed under: CloudShare | Tags: , , ,


Your CloudShare Operations team is always doing its best to stay ahead of the curve, monitor and improve performance, and maintain the security of your CloudShare environments/VMs, so you can stay focused and productive.

Last week, Microsoft released a critical Windows security patch which addresses two vulnerabilities in Microsoft’s implementation of Remote Desktop Protocol (RDP). One of the two, CVE-2012-0002, is a critical, remote code execution vulnerability affecting all versions of Windows. Read the rest of this entry »


Ilana Bercovitz

A Conversation with Trey Mayer of TekDog, Inc.

March 20th, 2012 | Author: | Filed under: CloudShare | Tags: , , , , , , ,


I recently had the opportunity to speak with Trey Mayer, SharePoint consultant, Nintex evangelist and Co-Founder of TekDog Inc. Read the rest of this entry »


Ilana Bercovitz

Why We Need Hackers

March 14th, 2012 | Author: | Filed under: CloudShare | Tags: , , , , , ,


After reading Gil Tayar’s post on our Agile Development process, I came across this post about hackers on the Rands in Repose blog. Rands quotes Philippe Kahn, once CEO of Borland (Microsoft competitor), who yelled out at a meeting, “We’re barbarians, not bureaucrats!”

Read the rest of this entry »


Ilana Bercovitz

Life Analytics

March 9th, 2012 | Author: | Filed under: CloudShare | Tags: , , , , , ,


I was lucky enough to have my co-worker send me this article where Stephen Wolfram provides in-depth analytics of his entire life. Everything from sleeping to eating to phone calls to meetings to emails to collaboration is included. He has literally spent years collecting data on top of data on top of data. It’s definitely worth a read.

Read the rest of this entry »


Ilana Bercovitz

Is the cloud secure?

February 21st, 2012 | Author: | Filed under: CloudShare | Tags: , , ,


At a time when a quick search can lead you to the social media channels that will tell you a person’s place of residence, relationship status, favorite restaurant, where they are in real time, who their best friends are, where they work, and more (see image below for further explanation) - is any of our information secure?

Read the rest of this entry »