In the latest Cloud Fundamentals Video Series --Operational Security versus Secure Development Practices for the Cloud,-- Tim Rains, Director, Trustworthy Computing -- asked Dennis Hurst, Enterprise Security Products District Manager at HP and Cloud Security Alliance member, to share his view on whether cloud providers could address these types of vulnerabilities using the type of operational security controls that seems to be the center of attention in the current public dialog around cloud security.
Dennis said, --If you don't create an application that's secure from the start it's very, very difficult to take that and operationally secure it.--
He shares his perspective on the importance of secure development practices for cloud services.
Responding to a New York Times article that described --How to Muddy Your Tracks on the Internet,-- that gives consumers some suggestions for addressing the complicated problem of managing the information left by one's activities online inclduing - website visits, searches, instant messages, e-mails, social-network postings, and so on.
Microsoft's Brendon Lynch, Chief Privacy Officer, shared how the company embrace the concept of --privacy by design.--
--With Internet Explorer 9 Tracking Protection Lists, customers can choose which third-party sites can receive their information and track them online. IE 9 also features In Private Browsing, a function that helps prevent web-browsing activity being retained by the browser. The Microsoft Personal Data Dashboard Beta gives consumers greater visibility and control of their Bing search history, as well as the ability to opt-out of personalized ads. And, Microsoft Hotmail does not scan the contents of customer e-mails to serve ads,-- wrote Lynch.
To learn more about our thinking, download this short paper.