Cloud 5: AWS turns to data, cloud could have prevented Sony hack

Posted by Ron Miller on Oct 9, 2015 9:09:03 AM

Cloud 5Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find.

Before we jump into this week's links, please have a look at one of our recent blog posts, Salesforce was never about no software. Salesforce is famous for its logo of software with a red slash through it, but it was never about eliminating software. It was changing the way we deploy it.

And without further delay, here we go with this week's links:

20 Steps: How to know you're ready for the cloud | Networkworld

This article outlines the technology you need to have in place, like encryption keys and two-factor authentication, to make a successful and secure move to the cloud. 

Amazon Launches Snowball, a Rugged Storage Appliance for Importing Data to AWS by FedEx | TechCrunch

It's interesting that there is a subset of data you can't simply move directly to the cloud. You have to physically send the data to move it, and this product provides a secure way to get it from point A to point B via FedEx (yes, FedEx).

CEO: Sky's the limit for competition in cloud | CNBC

The Rackspace CEO talked about his company's new agreement with AWS but pointed out that the company has agreements with many of the major infrastructure players. He sees a lot of competition there, but the numbers still suggest it's AWS's world for now.

Amazon Seeks Cloud Computing Growth With New Data Products | Bloomberg

AWS introduced a bunch of new products this week, several of which are about making it easier to move data to the cloud, a pain point for many organizations.

Box CEO on Sony Hack Lessons (video) | The Wrap

Box CEO Aaron Levie pointed out that all of the major hacks including Sony have involved ancient on-prem legacy hardware, and he suggested that it would have been much more difficult to extract all that data had these companies been in the cloud.

Photo Credit: Ron Miller. Used under CC 2.0 license.

Get updates in your inbox. Click here to subscribe to our blog!

Topics: The Cloud 5

Cyber security risk assessment
Intronis Local Lunches
MSP Phishing Quiz

Our Most Recent Posts

Intronis Local Lunches
MSP Marketing Assessment