Access "Due diligence processes for cloud computing compliance"
This article is part of the November 2010 issue of Meeting cloud computing compliance mandates
You have a dilemma. The company you work for has decided it will be moving some of its core IT operations to the cloud. As the information security officer, dread builds as you think about all of the confidential and proprietary data moving out of your control. All of the regulatory requirements governing that data start to run through your head. Does your company realize the risk surrounding what they consider a simple cost reduction? This is the reality most information security professionals face. The cloud computing revolution is upon us. It is impossible to ignore the talk everywhere about potential uses and cost savings for this new style of computing. This new computing model also forces a shift in thinking about information security and privacy, as well as compliance. The policies and procedures that information security used in a client-server computing model need to be reviewed and overhauled. This is a new frontier for computing that comes with a new set of risks and organizations need to be prepared. The fact to keep in mind is that cloud ... Access >>>
Premium Content for Free.
McAfee product strategy needs focus, analysts say
Slew of McAfee product initiatives pique interest of customers but industry analysts say the security giant needs to sharpen its focus.
Information security professionals on their pay, certifications
The economy is dragging down pay for information security professionals but not dampening their dedication.
- McAfee product strategy needs focus, analysts say
Due diligence processes for cloud computing compliance
Moving IT operations to the cloud requires careful due diligence to maintain compliance with HIPAA, GLBA and other regulations.
How to use an automated user provisioning system for access control
by Randall Gamby, Contributor
Re-architect your provisioning system into a first line of defense for access management.
- Due diligence processes for cloud computing compliance
Microsoft security proposal is noble, but no way
To cure the botnet plague, Microsoft wants to quarantine infected consumer PCs until they're remediated.
The Application Security Testing Gap
by C. Warren Axelrod
Application security reviews miss a critical vulnerability by not ensuring functional security.
Schneier-Ranum Face-Off on the dangers of a software monoculture
Security experts Bruce Schneier and Marcus Ranum debate the impact of a software monoculture on computer security.
- Microsoft security proposal is noble, but no way
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...