Securing the keys to the cloud

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

As the cloud model is put to the test at more organizations, security holes and malware are coming to light. Here's how to cope

Business networking site LinkedIn suffered a security breach in June that resulted in the theft of more than 6 million user account passwords, which were subsequently published online. Although the company says there were no reports of compromised accounts, the incident garnered headlines about the risks of the cloud.

And in April 2011, a server breach at email marketing company Epsilon Interactive exposed the names and email addresses of millions of people. The company said unknown intruders broke into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers.

[ Stay on top of the current state of the cloud with InfoWorld's special report, "Cloud computing in 2012." Download it today! | Also check out our "Private Cloud Deep Dive," our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]

As these incidents show, the cloud is still very much a work in progress when it comes to security. Although many cloud service providers claim they can secure their customers' data, security problems are surfacing as the technology takes hold at more organizations.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies