Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2014 Vol. 16 / No. 2

Beat the security odds with a cloud risk equation

Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their organization's cloud deployments and services. Cloud vendors often bypass IT and sell their services directly to individual departments. Individual departments develop and deploy internal cloud projects with limited communication, in some cases, with other groups. What's the best way to secure corporate assets and sensitive data in these environments?

In this issue, longtime contributor Peter Lindstrom takes on cloud security economics and offers up a simple risk equation to help security professionals plan their cloud computing strategies. We also cover the latest thinking on social engineering attacks, ways to craft bring-your-own-device strategies and offer the latest information security career data from TechTarget's IT salary survey.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close