Access "The need for cloud computing security standards"
This article is part of the December 2011 issue of An insider look at the Windows Vista security review
The cloud is inescapable. Headlines catalog every advance and setback in the as-a-service paradigm with equal fervor. Providers trumpet the model as a panacea for every painful budget cut and desperate business need. And IT professionals scramble to come up with a cloud strategy that will not only help their business slash expenses, but also support the kind of operational agility their enterprise needs to get ahead in the marketplace. Yet today, most businesses are still only using the cloud to support a small percentage of their IT needs. Current Analysis’ recent survey of North American enterprises, “Enterprise Adoption of Cloud Applications and Services, June 2011” found businesses are using cloud services to support fewer than 10 percent of their IT requirements today. While adoption is expected to accelerate in the coming years, organizations are still wary of the cloud as the right delivery environment for many business applications. Hands down, the dominant concern is security. Businesses question whether their data is safe in the cloud, and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage, Editor
Companies need to factor security risks and incidents in their financial disclosures, agency says.
-
Enterprise digital rights management best practices
by Rich Mogull
EDRM brings users into security more than any other tool. Are you ready?
-
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage, Editor
-
-
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon, UK Bureau Chief
As the relative security of passwords falters, are they destined for obscurity?
-
Chris Paget on Vista final software security review
by Chris Paget, Contributor
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
-
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon, UK Bureau Chief
-
Columns
-
The ongoing debate over a federal breach notification law
by Marcia Savage, Editor
Lawmakers continue to wrangle over creation of a national data breach notification standard.
-
Good information security leaders must be good security recruiters
by Lee Kushner and Mike Murray
If you’re going to lure topnotch talent, refine your skills.
-
The need for cloud computing security standards
by Amy Larsen DeCarlo, Contributor
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.
-
The ongoing debate over a federal breach notification law
by Marcia Savage, Editor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO