Access "Big data creates cloudy security forecast"
This article is part of the March 2013/ Volume 15 / No. 2 issue of Outsourcing security services
Back in 2009, some researchers at Sensepost Security in South Africa decided to poke around in the security mechanisms of a couple of the major cloud providers. The results were presented at Black Hat and Defcon. The researchers set limits for themselves so that they didn’t run afoul of the law, but still managed to find some fairly amusing gotchas. They were nice about it and passed along their findings to the relevant cloud providers. And none of the security holes they uncovered resulted in major breaches or takedowns. Still, it made a skeptic out of me where cloud security was concerned. For a couple of years, my answer to “how do you secure the cloud?” was “it can’t be done.” I’m still pretty skeptical about cloud security. I’ve grudgingly come to recognize, however, that some pretty good work is going on, to make it possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud. Even if application security in the cloud isn’t yet ironclad, it’s increasingly attractive to use the cloud ... Access >>>
Premium Content for Free.
Outsourcing security services in the enterprise: Where to begin
by Mike Chapple, Enterprise Compliance
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services.
Managing big data privacy concerns: Tactics for proactive enterprises
by Lynn Goodendorf, Contributor
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help enterprises get smarter while keeping consumers happy.
- Outsourcing security services in the enterprise: Where to begin by Mike Chapple, Enterprise Compliance
Antivirus evasion techniques show ease in avoiding antivirus detection
by Joe Granneman, Contributor
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed.
- Antivirus evasion techniques show ease in avoiding antivirus detection by Joe Granneman, Contributor
Big data creates cloudy security forecast
by Robert Richardson
Security in the cloud has come a long way and it’s now possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud.
Well-rounded information security education benefits IT professionals
by Doug Jacobson and Julie A. Rursch
A security-savvy IT staff can help reduce risk. Learn about information security training and education options for IT professionals.
Marcus Ranum: Cloud service-level agreements
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with Randy Sabett, counsel at ZwillGen PLLC and formerly with the National Security Agency to discuss cloud SLAs.
- Big data creates cloudy security forecast by Robert Richardson
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...