Page 3 - index
P. 3







Securing the Cloud from Holes, Hackers and Malware


Some of you might be as excited as I am about what’s in store for
us next February at the RSA Conference 2014 in San Francisco,

CA, USA. Meanwhile, we’re overloaded with new attack vectors
from mobile devices to virtual machines.


On that Note, we decided to focus this month’s edition on Cloud

Security, as it seems more and more businesses are making their
businesses dependent upon some form of Cloud computing –
whether it be public, private or hybrid cloud infrastructures.



We need to understand the advantages of Cloud computing but also the risks – from cross-
virtual-machine exploitation to distributed denial of service – attacking the advantages of the
cloud such as elasticity and flexible expansion and billing of Cloud resources.



I hope you will send a note to some of our new writers, thanking them for the time they put into
this edition – we really have lots of interesting points of view on Securing the Cloud.


Please enjoy this month’s edition of Cyber Warnings and don’t forget – the battle with malware

is never over – so we have saved a special article for you on this important subject.


With that all said, now is the time to learn about the best practices, tools and techniques to
protect your own privacy and that of your organization. Stay vigilant and keep learning!

Information Security isn’t a static subject matter – it’s fluid and ever changing – the dynamic
means you have to stay on your toes to keep up. Exciting, isn’t it?




To our faithful readers, Enjoy,

Pierluigi Paganini


Pierluigi Paganini, Editor-in-Chief, [email protected]



P.S. Congrats Stephen Banks (USA) – this month’s contest winner!
   1   2   3   4   5   6   7   8