Premium Content

Access "Beat the security odds with a cloud risk equation "

Issue Overview

Information Security magazine - March 2014 Vol. 16 / No. 2

Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their organization's cloud deployments and services. Cloud vendors often bypass IT and sell their services directly to individual departments. Individual departments develop and deploy internal cloud projects with limited communication, in some cases, with other groups. What's the best way to secure corporate assets and sensitive data in these environments?

In this issue, longtime contributor Peter Lindstrom takes on cloud security economics and offers up a simple risk equation to help security professionals plan their cloud computing strategies. We also cover the latest thinking on social engineering attacks, ways to craft bring-your-own-device strategies and offer the latest information security career data from TechTarget's IT salary survey.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...