Deep Dive

Download the Cloud Security Deep Dive

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

cloud security

Cloud computing is a new paradigm that challenges traditional security dogma. Old assumptions are gone forever and the ones that replace them will make the security manager's job harder than ever. In this Deep Dive, renowned security expert and InfoWorld contributing editor Roger Grimes explains how the era of the cloud is changing the threat model -- and what you should do to respond.

This PDF report provides the following benefits:

  • How cloud architecture leads to new threats, from 24/7 Internet accessibility to multitenancy to the effect of broad authentication schemes
  • A complete framework for discussion the effects of cloud computing within your organization
  • Best practices for guarding against new threats, including data encryption, strong authentication, red herring data, and more
  • How to identify providers that fail to employ security appropriate for the cloud computing era.
To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address: