Access your Pro+ Content below.
Due diligence processes for cloud computing compliance
This article is part of the Information Security magazine issue of November 2010
You have a dilemma. The company you work for has decided it will be moving some of its core IT operations to the cloud. As the information security officer, dread builds as you think about all of the confidential and proprietary data moving out of your control. All of the regulatory requirements governing that data start to run through your head. Does your company realize the risk surrounding what they consider a simple cost reduction? This is the reality most information security professionals face. The cloud computing revolution is upon us. It is impossible to ignore the talk everywhere about potential uses and cost savings for this new style of computing. This new computing model also forces a shift in thinking about information security and privacy, as well as compliance. The policies and procedures that information security used in a client-server computing model need to be reviewed and overhauled. This is a new frontier for computing that comes with a new set of risks and organizations need to be prepared. The fact to keep...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Slew of McAfee product initiatives pique interest of customers but industry analysts say the security giant needs to sharpen its focus.
Moving IT operations to the cloud requires careful due diligence to maintain compliance with HIPAA, GLBA and other regulations.
The economy is dragging down pay for information security professionals but not dampening their dedication.
Re-architect your provisioning system into a first line of defense for access management.
Columns in this issue
To cure the botnet plague, Microsoft wants to quarantine infected consumer PCs until they're remediated.
Application security reviews miss a critical vulnerability by not ensuring functional security.
Security experts Bruce Schneier and Marcus Ranum debate the impact of a software monoculture on computer security.