<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Cloud Security: Are people’s concerns justified?</title>
	<atom:link href="http://www.gfi.com/blog/cloud-security-peoples-concerns-justified/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/cloud-security-peoples-concerns-justified/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cloud-security-peoples-concerns-justified</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Michel Billard</title>
		<link>http://www.gfi.com/blog/cloud-security-peoples-concerns-justified/comment-page-1/#comment-20852</link>
		<dc:creator>Michel Billard</dc:creator>
		<pubDate>Sun, 13 Feb 2011 22:23:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2010#comment-20852</guid>
		<description><![CDATA[Thanks for the article. This topic is a hot discussion point at my job. We constantly argue about using Cloud services or not. I believe that Cloud-based solutions can really help a small company, but sometimes I wonder if I&#039;m being too naive. On the other side, I don&#039;t think all the fears of having your data stolen are really founded and that most of the time, it&#039;s just paranoia kicking in. Even though the content was leaked, would it really be such a big deal most of the time?]]></description>
		<content:encoded><![CDATA[<p>Thanks for the article. This topic is a hot discussion point at my job. We constantly argue about using Cloud services or not. I believe that Cloud-based solutions can really help a small company, but sometimes I wonder if I&#8217;m being too naive. On the other side, I don&#8217;t think all the fears of having your data stolen are really founded and that most of the time, it&#8217;s just paranoia kicking in. Even though the content was leaked, would it really be such a big deal most of the time?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Matthias</title>
		<link>http://www.gfi.com/blog/cloud-security-peoples-concerns-justified/comment-page-1/#comment-9536</link>
		<dc:creator>Matthias</dc:creator>
		<pubDate>Tue, 31 Aug 2010 14:47:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2010#comment-9536</guid>
		<description><![CDATA[Although I agree with the fact that trusting a major vendor of software in the cloud with company might be a better approach in some cases that trusting one or two  IT staff in-house, an emerging concern for cloud delivery models using virtualisation platforms is also the risk of side channel attacks causing data leakage across co-resident virtual machine instances. 

This risk is evolving, though currently is considered to be in its infancy, as the virtual machine technologies mature. However, it is possible that attackers who fail to compromise endpoints or penetrate cloud infrastructure from outside the cloud perimeter, may consider this technique. Acting as a rogue customer within a shared cloud infrastructure to access other customers’ data.]]></description>
		<content:encoded><![CDATA[<p>Although I agree with the fact that trusting a major vendor of software in the cloud with company might be a better approach in some cases that trusting one or two  IT staff in-house, an emerging concern for cloud delivery models using virtualisation platforms is also the risk of side channel attacks causing data leakage across co-resident virtual machine instances. </p>
<p>This risk is evolving, though currently is considered to be in its infancy, as the virtual machine technologies mature. However, it is possible that attackers who fail to compromise endpoints or penetrate cloud infrastructure from outside the cloud perimeter, may consider this technique. Acting as a rogue customer within a shared cloud infrastructure to access other customers’ data.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 07:16:05 by W3 Total Cache --