Access your Pro+ Content below.
Beat the security odds with a cloud risk equation
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their organization's cloud deployments and services. Cloud vendors often bypass IT and sell their services directly to individual departments. Individual departments develop and deploy internal cloud projects with limited communication, in some cases, with other groups. What's the best way to secure corporate assets and sensitive data in these environments?
In this issue, longtime contributor Peter Lindstrom takes on cloud security economics and offers up a simple risk equation to help security professionals plan their cloud computing strategies. We also cover the latest thinking on social engineering attacks, ways to craft bring-your-own-device strategies and offer the latest information security career data from TechTarget's IT salary survey.
Access this Pro+ Content for Free!
Features in this issue
This Beyond the Page focuses on how information security pros can apply their skills and knowledge to increasing enterprise security as corporate assets and data are moved to the cloud.
Is the cloud more or less secure than your current environment? How to assess your risk before moving data processing or applications to the cloud.
To combat social engineering techniques, know thy data and how to protect it against exfiltration by malicious actors.
Before implementing containerization or other technologies, CISOs need to craft an enterprise strategy to secure employee-owned devices.
Columns in this issue
The value of information security professionals can outweigh security technology. Does your organization show you the money?
An early proponent of Microsoft SRP, Aaron Turner says application whitelisting has finally taken hold in consumer app stores.
Total compensation is up, and one-third of IT organizations are looking to make new hires, according to our annual information security salary survey.
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts.