Premium Content

Access "Beat the security odds with a cloud risk equation "

Issue Overview

Information Security magazine - March 2014 Vol. 16 / No. 2

Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their organization's cloud deployments and services. Cloud vendors often bypass IT and sell their services directly to individual departments. Individual departments develop and deploy internal cloud projects with limited communication, in some cases, with other groups. What's the best way to secure corporate assets and sensitive data in these environments?

In this issue, longtime contributor Peter Lindstrom takes on cloud security economics and offers up a simple risk equation to help security professionals plan their cloud computing strategies. We also cover the latest thinking on social engineering attacks, ways to craft bring-your-own-device strategies and offer the latest information security career data from TechTarget's IT salary survey.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Continuous monitoring program demystified
    ism_1014.png
    E-Zine

    For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...