Access your Pro+ Content below.
Cloud computing risks and how to manage them
This article is part of the Information Security magazine issue of June 2010
As cloud computing moves from marketing hype to reality -- real customers with real utilization, it's increasingly important that information security practitioners understand the significant change in computing the cloud heralds and how that impacts enterprise risk. Cloud computing is evolving rapidly, and there is no shortage of vendors suddenly claiming to be "cloudy," which can make it all the harder to discern the critical security ramifications of the cloud for the enterprise. We'll shine a light on cloud computing and examine how the public cloud model alters the enterprise risk posture. We'll also look at how information security practitioners should prepare for moving into the cloud as well as emerging governance frameworks and other changes that must happen to make cloud computing more trustworthy. HOW THE CLOUD IMPACTS SECURITY To begin, cloud computing is an evolution in computing, and does not introduce new technology. Instead, the cloud is about a different business and operating model -- one based on shared ...
Access this PRO+ Content for Free!
Features in this issue
Cloud computing alters enterprise risk. Here's what you need to know in order to safely navigate the cloud.
Symantec acquisitions of PGP and Guardian Edge future ensures that encryption is becoming less of a standalone security tool.
Learn about the options for protecting laptop data, including full disk encryption and file/folder encryption, and their associated deployment and management challenges.
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.
Columns in this issue
Organizations who stay silent after a data security breach end up paying a higher price and helping cybercriminals.
Bruce Schneier and Marcus Ranum debate the risks associated with hiring hackers.
If you're spending more to protect custodial data because of compliance than you are to protect company secrets, you're missing the big picture.