Of all the strategies and tactics available to prevent breaches, deter data
leakage and theft, control access and secure beyond the so-called network
perimeter, the one that is emerging as an achievable and affordable best
practice is that of unified security from the cloud.
But if you look across the web, you will no doubt come across various
versions of what constitutes “unified,” what is “protected,” and,
what is “security from the cloud?” Luckily this means that the concept of
unified security from the cloud is becoming more and more of a best practice.
In general, the practice of unified security is the centralization of all
security functions under one umbrella across the enterprise. This means more
than ensuring data encryption. It means more than access policies. It means
more than intrusion detection, malware blocking, data review. It’s more
than ensuring ... (more)
You realize the overarching benefits of the cloud, but you are a bit wary
regarding the security of any data stored and transacted in these virtualized
environments. But the cost-saving benefits and user preference and resource
delegation of the cloud are such that not integrating some processes,
applications and data is counterproductive to your overall IT strategy. So
you decide that a private cloud is a more secure route that its public
counterpart. But are you really any more secure?
The quick answer is no. But not for the reason you might think. A private
cloud is infrastr... (more)
“The ‘how’ may change, but the ‘what’ is fundamental to risk
I heard these sage words at a recent ISSA (Information Systems Security
Association) meeting from a CIO speaking about security from the cloud.
He continued, “Risk is not unique to the cloud. It experiences the same
issues that affect any outsourcing or third party deliverable. It is bounded
by the same concerns regarding governance—does it meet the requirements of
my industry? Is my data free from co-mingling? Are the proper notification
protocols in place?”
Do a Google search on “cloud security” and the ... (more)
One of the true benefits of the cloud is the ability to reconfigure and
create a stronger, more active asset protection strategy than you might be
able to otherwise afford. But let’s look beyond the cost factor for a
moment and analyze a true best practice that gives an organization a true
advantage within the cloud and an overall strategic deployment of security
To look at the future of security configuration we have to look back 500
years into the mists of history to see a model that worked well then…and
works just as well today. I’m talking specifically of the cast... (more)
“Don’t care how…I want it now!”
-Veruca Salt (Willy Wonka and the Chocolate Factory)
We live and work in a world of immediate gratification. In the name of
greater productivity if you need to check inventory from a supplier’s
warehouse…click there it is. Share a file on Dropbox, no problem. Add
detail about a meeting in the sales database… click! Update your Facebook
or LinkedIn status. Email a white paper to a potential client...click, click.
Want to see that flying pig meme…well, you get the picture.
Now that’s not necessarily a bad thing…unless you’re an IT professional
and th... (more)