Out of the ‘Blue Cloud’: Top Cloud Stories 2014

This year, Cloud Security joined mainstream cloud conversations. Cloud storage generated many of the year’s top news stories; from advanced technology announcements to market changing acquisitions. Here…

SDN – Its Security is Inevitable!

It’s time to drive the SDN wagon further ahead! In the past, we have touched upon aspects that define SDN, understood the “openflow” connection found out what…

SDDC: Extending Virtualization Concepts

SDDC is the abbreviation for Software-Defined Data Center. SDDC is a concept wherein eventually all elements – compute, networking and storage systems in the data center will…

Why SMB3 NAS?

Microsoft has been investing quite seriously in the Network Attached Storage (NAS) protocol SMB 3. This clearly states that NAS is the way ahead. This post summarizes…

Security Holes – Part 2

In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in…

Security Holes – Part 1

Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource…

Technical Deep Dive: LSM and SELinux Internal Structure

LSM Module: OS Security is a chronic and growing problem: as more systems (and more money) go on line, the motivation to attack rises. Linux is not…

OpenStack Grizzly – 4 Key Facets

OpenStack came up with its new release called ‘OpenStack Grizzly’ earlier this April. This release is seventh in the row and is driven by users who have…

Open Stack: A Sneak-peek

Founded by Rackspace Hosting and NASA, OpenStack is used for building massively scalable private and public clouds. OpenStack can also be referred to as a global collaboration…