Home Blog Page 1003

SMBs And Cloud Security

servers-logoFor SMBs, using cloud and managed hosting services relieves IT of the need to buy, house, and manage infrastructure, and of many associated costs and tasks. But “going cloud” does not eliminate all in-house IT responsibilities — including security.

To be sure, a cloud/hosting provider must be responsible for many aspects of IT security. How much depends in part on whether you are simply using infrastructure, or also using applications and other services from the provider.

But, in general, whatever your company does using provider services — running on them or connecting to them — it is up to your company to make sure they are properly secured.

In his “Schneier on Security” blog, security/privacy expert Bruce Schneier points out “Cloud providers have the potential to be far more secure than the corporations whose data they are holding. It is the same economies of scale. For most companies, the cloud provider is likely to have better security than them — by a lot.”

Here’s a look at what aspects of IT security you can — and can’t — look to your cloud vendor to handle, according to Kostyantyn Bezruchenko, CTO of global cloud platform and hosting provider Servers.com.

Security Your Cloud Provider Should Provide

“For Servers.com, cloud and hosting IT security begins at the hardware configuration level,” says Bezruchenko. “For example, at the network level, we have a fully redundant private wide-area network, isolated at the hardware level,” says Bezruchenko. “The private networks ensure the security of communication of customer processes among servers and storage both within and between our data centers, such as virtual machines, containers, and clustering.”

“Because a cloud is a mix of different hardware components, which may be highly dependent one from another, physical security is more important for cloud than for typical bare-metal server infrastructure,” says Bezruchenko.

“However, it’s way more important to keep software infrastructure up-to-date, since any security breach can lead to massive data exposure of all virtual machines running on the same host,” says Bezruchenko.

Servers-datacenter4In terms of software, what you can expect depends in part on what services you are purchasing. If you’re buying bare-metal hosting or cloud virtual machines, the provider is responsible for the security of the platform — but security for the applications, data, and interactions with other systems and with users is likely to be up to your company.

“Security common across all service provides includes network firewall, web application firewall (WAF), private networking, and DDoS protection,” says Bezruchenko. “We already have the last two, and are working with various vendors to implement network and web application firewalls.”

Along with security proper, your cloud provider is responsible for some of the regulatory compliance requirements — but check carefully, as your company is likely responsible for ensuring security compliance of your software architecture and your applications.

“Not every enterprise can afford to maintain same service quality as data centers do,” says Bezruchenko. “Nowadays, keeping any data in data center is more secure than on-premises. A data center may be less secure in terms of physical access, but in terms of power and connectivity — which is also a part of security — the data center absolutely wins. Take a DDoS attack as an example — each of our data centers has at least 400Gbps of external network capacity, which may help to sustain volumetric DDoS attacks. It will be hard to do that on-premises.”

Cloud-Related Security Your Company Is Responsible For

“We, as a service provider, can only provide a secure infrastructure and some additional instruments, like private networks, DDoS protection, and firewalls,” says Bezruchenko. “However, the most important part is customer application security. We can only suggest customers to run penetration testing before an application goes live, and use qualified sysadmins to secure their servers.”

This includes securing all the applications, and managing passwords and permissions. It may include operating system instances, system images, and virtual machine and container templates, which are come “out of the box” needing to be secured. It also includes securing all interaction between your company’s IT and the cloud provider, including APIs and the network connections.

Because your developers and administrators are working “remotely” with cloud resources, you need to provide secure remote-access methods, tools, and procedures — and be sure that all access credentials, and the tools that manage those, are well-secured.

You also need to make sure that the same level of IT security you use for your own systems and networks is applied to your cloud activity, such as network firewalls and intrusion detection/monitoring.

It’s also advisable that you do regular backup of data that’s stored in the provider to a separate third-party service.

Security Questions For Your Cloud Provider

Here are some security questions to ask a prospective cloud provider:

  • Multitenant security (shared environments): How do they ensure that other tenants (i.e., unauthorized users) won’t be able to access your private data?

  • Securing the virtualization layer: Similarly, for servers hosting VMs from multiple customers, how are these secured?

  • Regulatory compliance: How do they help you identify, and comply with, all relevant industry and geographic/political regulations? Which ones are the provider responsible for?

  • How do they prevent “shadow cloud” activity of their services by your employees and contractors?

  • Do they offer encryption? Does that include key management? If so, who has access to the encryption keys?

  • Do they offer identify and access management? File integrity monitoring?

  • Do they offer integration points that work with whatever identity and security you are using?

In general, ask your target cloud provider what security they do — and don’t — provide, and what if any services they offer to help your company fill in those gaps.

A beginners Guide to Bash Scripting on Linux

A Brief Introduction
Bash or Bourne again shell is a replacement to the original unix shell written by Stephen Bourne at Bell Labs.

It offers vast improvements over the original shell, which include
Integer arithmetic,
Indexed arrays,
Command line editing,
Unlimited command history.

Bash scripts are available by default on most Linux distributions.

To find out which version of bash you are running type the following command.

[leo@bash101 ~]$ bash –version

 

Read More 

Microsoft and DataStax Tie Up Cassandra on Azure Deal As New Titan Graph Database Rolls Out

It’s big day for Cassandra firm DataStax, with its database offering now on Microsoft Azure, plus the release of the Titan graph database.

After a year’s technical collaboration, Microsoft and DataStax have today unveiled a tie-up that puts the distributed database firm’s enterprise Apache Cassandra offering on the Azure cloud computing platform. The two companies say DataStax Enterprise on Microsoft Azure will help developers create and manage internet-of-things, web and mobile apps across public and private clouds.

Read more at ZDNet News

GPUs Power Low-Cost Supercomputer Solution from Nor-Tech

Nor-Tech recently announced low-cost, GPU-powered supercomputer configuration that reduces the HPC purchase cost by 2/3 to 3/4 (about $20,000 less for an 8 GPU server). According to Nor-Tech, the solution is a good fit for nearly all, but not all organizations.

“We figured out a way to get consumer-grade cards into a 4U chassis,” said Nor-Tech’s Vice President of Engineering, Dom Daninger and his team tested and retested the prototype until they were satisfied that their solution would be successful for most applications. “The result is a niche product that allows nearly all organizations to take advantage of GPU supercomputing capabilities—in essence supercomputing capabilities at an unheard of price point.”

Read more at insideHPC

Google’s New Squeeze: Brotli Compression Open-Sourced

Google wants to bring to life the HBO series Silicon Valley: it’s pitching a new open source compression algorithm into the world, with the hope that it can eventually end-of-life the venerable Deflate. 

Brotli (“small bread” in Swiss German, apparently) follows on from Zopfli (“little braid,” also bread-themed), but with between 20 and 26 percent better compression ratios. That, software engineer Zoltán Szabadka of Google’s Compression Team writes, is because while Zopfli maintained Deflate compatibility, Brotli uses new data structures.

Read more at The Register

Upload Photos On Flickr With Frogr Flickr Upload Client For Linux


Upload Photos On Flickr With Frogr Flickr Upload Client For Linux

Frogr is a Linux client for uploading photos on Flickr. Users of Flickr don’t need to visit the Flickr web app to upload their favorite photos. Frogr allows you to upload photos and let you edit the photos’ title, description, tags and privacy etc. It allows you to edit whatever the flickrweb app provides. Frogr is officialy for GNOME but this works fine with Unity and other desktop environment.  

Read At LinuxAndUbuntu

ScyllaDB Database Emerges Out of Cloudius Systems

The new NoSQL column store database is intended to be a drop-in replacement for Apache Cassandra.

Avi Kivity is well-known in the open-source and Linux communities as the original lead developer of the widely deployed KVM hypervisor. In 2012, Kivity started a company called Cloudius Systems, which develops the OSv operating system for the cloud. Today, Cloudius is being rebranded and refocused under the name ScyllaDB.

Read more at eWeek

How Open Source and Crowdfunding Are Creating a New Business Niche

The convergence of crowdfunding and open source is having some unexpected results.

A modular laptop built with a Raspberry Pi. An ergonomic, programmable, mechanical keyboard made from slabs of maple, so it looks like a solid-state electric guitar. A device that plugs into a wall socket that allows you to control devices from your smart phone. 

What do these and hundreds of other devices – from wearable tech to portable solar chargers – have in common? First, all of them are being crowdfunded. Second, many are being boot-strapped with open source software.

Read more at Datamation

Introducing the Unofficial OneDrive Client for Linux

onedrive-client-for-linuxYou’ve got to love the open source community! We have just discovered, while digging the Internet, that an independent developer managed to create the first-ever OneDrive client for GNU/Linux operating systems.

According to the project’s website, it aims to be a minimal OneDrive client for Linux, which comes as an open-source (GPLv3) and freely distributable binary, usable via the command-line interface (for the moment), featuring no Java or Python code.

XcodeGhost Apps Haunting iOS App Store More Numerous Than First Reported

Security researchers have both good and bad news about the recently reported outbreak of XcodeGhost apps infecting Apple’s App Store. The bad: the infection was bigger than previously reported and dates back to April. The good: affected apps are more akin to adware than security-invading malware.

 

“XCodeGhost seems to be far more widespread than initially assumed,” researchers from security firm Appthority wrote in a blog post published Monday.

Read more at Ars Technica