Access "Cloud computing security framework may ease security concerns"
This article is part of the March 2009 issue of Top considerations for midmarket security
Not long ago, a researcher at the pharmaceutical company Eli Lilly needed to analyze a lot of data fast. If the results turned out as he believed, the company could have a world-beating drug on its hands. The only trouble was that he would need 25 servers to crunch the huge volume of data, and he knew it could take up to three months to get approval for the investment. In an industry where the cost of delaying a product is estimated at $150 per second (yes, per second), that three months' wait would be very expensive indeed. Adrian Seccombe, the company's global head of security, explains: "He went to a tame IT guy who'd been playing around in this thing called 'The Cloud'. The guy got out his credit card, plugged it into Amazon Web Services, and had 25 servers up and running in the cloud within an hour." They then realized they'd built the servers incorrectly so they had to take them down and start again. The second time, it took them 40 minutes to get the servers up and running. "Within two hours they were crunching the data. The research time had suddenly... Access >>>
Premium Content for Free.
Five considerations for securing a midmarket company
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
Choosing the right Web application firewall
by Michael Cobb, Application Security
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
Cloud computing security framework may ease security concerns
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
- Five considerations for securing a midmarket company
How to Secure Cloud Computing
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
How to secure use of Web 2.0
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
- How to Secure Cloud Computing
Cybersecurity's profile rising under Obama
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
Enforcing a vendor risk assessment to avoid outsourcing security risks
by David Mortman, Contributor
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Data classification best practices: Techniques, methods and projects
by Jay Heiser, Contributor
Effective data classification in the enterprise requires a simple approach.
- Cybersecurity's profile rising under Obama
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...