Access "Three cloud computing risks to consider"
This article is part of the June 2009 issue of Effective strategies for risk management and security information management systems
THE "CLOUD" is often used as a generic term for any type of Web-based application. It is most commonly used today to refer to the grid or utility computing model, where it replaces local hardware and storage input/output. Organizations are moving to the cloud, some faster than others. However, moving to the cloud presents the enterprise with a number of risks to assess. At the core of these risks is the inability of many cloud/Web 2.0 vendors to meet regulatory and legal requirements. Here are the top three risks: 1. Security: For many organizations, security of information is the most critical risk. This may be driven by a need to protect intellectual property, trade secrets, personally identifiable information, or other sensitive information. Making that sensitive information available on the Internet requires a significant investment in security controls and monitoring of access to the content and the pathways to the information. The logging and auditing controls provided by some vendors are not yet as robust as the logging provided within enterprises and... Access >>>
Premium Content for Free.
How to write a risk methodology that blends business, security needs
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
Lack of cloud computing definition adds confusion, risk
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
- How to write a risk methodology that blends business, security needs
Risk management must include physical-logical security convergence
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Mature SIMs do more than log aggregation and correlation
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
- Risk management must include physical-logical security convergence
Three cloud computing risks to consider
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
New partnerships, creative thinking help security bust recession
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.
- Three cloud computing risks to consider
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...