Access your Pro+ Content below.
Cloud computing technology: Don't get left behind
This article is part of the Information Security magazine issue of December 2010
Unless you've been living under a rock, you know that cloud computing is all the rage these days. Cash-strapped businesses are eagerly looking to move IT operations and applications to the cloud in order to cut costs. For enterprise security managers, this trend is nerve-wracking to say the least. Already battered by constantly evolving Internet threats and compliance demands, the last thing you want to do is lose control of your corporate data to a cloud service provider. But you better figure out a way to deal with this cloud phenomenon. As several industry experts pointed out at the Cloud Security Alliance Congress in November, cloud computing is a trend that's here to stay. More than one speaker at the conference described cloud computing as a train ride and security professionals should make sure they aren't left behind. Symantec Chairman John Thompson drew a particularly colorful analogy, comparing cloud computing to Mother Nature, against which it's futile for IT professionals to fight. He and other speakers urged ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Security must be included in disaster recovery planning to ensure sensitive data is protected.
The Data Accountability and Trust Act, if passed into law, would create a national standard for privacy and data protection.
Cybercriminals are taking advantage of poorly deployed security software with customized malware designed to infiltrate systems and steal data without being detected.
The CISO has a key role in reducing the risk of sharing sensitive corporate data with third parties.
Columns in this issue
Cloud computing presents a lot of security issues but security professionals need to accept the challenge.
Choose wisely when pursuing industry certifications and advanced degrees to gain the best competitive advantage.
In the 112th Congress, enterprises can expect a heavy focus on Internet privacy issues on Capitol Hill.