Access "Cloud computing technology: Don't get left behind"
This article is part of the December 2010 issue of Inside the Data Accountability and Trust Act and what it means for security
Unless you've been living under a rock, you know that cloud computing is all the rage these days. Cash-strapped businesses are eagerly looking to move IT operations and applications to the cloud in order to cut costs. For enterprise security managers, this trend is nerve-wracking to say the least. Already battered by constantly evolving Internet threats and compliance demands, the last thing you want to do is lose control of your corporate data to a cloud service provider. But you better figure out a way to deal with this cloud phenomenon. As several industry experts pointed out at the Cloud Security Alliance Congress in November, cloud computing is a trend that's here to stay. More than one speaker at the conference described cloud computing as a train ride and security professionals should make sure they aren't left behind. Symantec Chairman John Thompson drew a particularly colorful analogy, comparing cloud computing to Mother Nature, against which it's futile for IT professionals to fight. He and other speakers urged security pros to embrace the trend as... Access >>>
Premium Content for Free.
Disaster recovery and contingency planning security considerations
Security must be included in disaster recovery planning to ensure sensitive data is protected.
Customized malware programs require new response, experts say
Cybercriminals are taking advantage of poorly deployed security software with customized malware designed to infiltrate systems and steal data without being detected.
- Disaster recovery and contingency planning security considerations
Understanding the Data Accountability and Trust Act
by Richard E. Mackey, Jr., Contributor
The Data Accountability and Trust Act, if passed into law, would create a national standard for privacy and data protection.
Vendor risk management and the CISO
by Eric Holmquist
The CISO has a key role in reducing the risk of sharing sensitive corporate data with third parties.
- Understanding the Data Accountability and Trust Act by Richard E. Mackey, Jr., Contributor
Cloud computing technology: Don't get left behind
Cloud computing presents a lot of security issues but security professionals need to accept the challenge.
Career advantages of security professional certifications and advanced degrees
by Lee Kushner and Mike Murray
Choose wisely when pursuing industry certifications and advanced degrees to gain the best competitive advantage.
Internet privacy laws will get attention in the next Congress
by Judith Harris, Christopher Cwalina, and Amy Mushahwar
In the 112th Congress, enterprises can expect a heavy focus on Internet privacy issues on Capitol Hill.
- Cloud computing technology: Don't get left behind
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...