Access "How to Secure Cloud Computing"
This article is part of the March 2009 issue of Top considerations for midmarket security
Cloud computing is attractive, seductive and perhaps irresistible. The benefits are compelling, particularly the pay-as-you-go model that has been likened to buying electricity (or, if you, prefer, buying your drinks by the glass rather than the bottle). There's a powerful business case for buying computational power, disk storage, collaboration, application development resources, CRM, on demand. Rather than buying more servers and disks or expanding or deploying expensive infrastructure and programs, cloud computing is flexible and scalable. It can meet short-term initiatives and requirements and deal with peaks and valleys in business cycles. But where does security fit into all this? Security analysts and practitioners generally say proceed, but proceed with caution. All the risks to sensitive corporate data associated with outsourcing apply to cloud computing, and then some. Enforcing security policy and meeting compliance requirements are tough enough when you deal with third parties and their known or unknown subcontractors, especially on a global ... Access >>>
Premium Content for Free.
Five considerations for securing a midmarket company
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
Choosing the right Web application firewall
by Michael Cobb, Application Security
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
Cloud computing security framework may ease security concerns
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
- Five considerations for securing a midmarket company
How to Secure Cloud Computing
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
How to secure use of Web 2.0
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
- How to Secure Cloud Computing
Cybersecurity's profile rising under Obama
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
Enforcing a vendor risk assessment to avoid outsourcing security risks
by David Mortman, Contributor
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Data classification best practices: Techniques, methods and projects
by Jay Heiser, Contributor
Effective data classification in the enterprise requires a simple approach.
- Cybersecurity's profile rising under Obama
More Premium Content Accessible For Free
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...