Reading this on a mobile device? Try our optimized mobile version here:

March 13, 2012
Share|Sign up|Archive|Advertise

Spotlight on: Cloud Security
If cloud computing is the hottest trend in IT right now, then finding ways of coping with the difficulties caused by adopting it is probably a close second. In addition to all the logistical hurdles that come with procuring and setting up cloud tools, IT leaders need to be aware of the unique security risks the cloud poses -- and how they can secure their data before it's too late.

This SmartBrief on ExecTech special report looks at the latest studies, best practices guidelines and tools you can use to keep your company's data secure in a cloud environment. When you're finished reading the report, take a minute to answer a few poll questions and see how your attitudes toward cloud computing stack up against those of your fellow IT leaders.

If you enjoyed this special report, why not share it with your colleagues? SmartBrief on ExecTech is a free daily e-mail newsletter featuring the hottest stories in new tech tools and IT management. Tell your co-workers to sign up today!


Research and Reports 
  • Most companies aren't taking needed cloud precautions, survey finds
    A majority of IT leaders say security issues are one of the biggest problems with embracing cloud technologies -- yet research shows that most businesses have done little to address those concerns. Almost three-quarters of firms using cloud services exert no control over the security of their cloud-based servers, a CloudPassage survey finds. Companies need to do more to educate themselves about cloud-security risks and work to take charge of their own security, writes Kevin Fogarty. blog (2/17) LinkedInFacebookTwitterEmail this Story
  • Definitions are released for effort on cloud security standards
    Definitions for more than 150 security controls from the federal CIO Council are part of an effort to standardize requirements around cloud computing services and products. The CIO Council says this is the first step to the launch of FedRAMP, a multi-agency security-authorization service. InformationWeek (1/10) LinkedInFacebookTwitterEmail this Story
Gartner Magic Quadrant for Dynamic Application Security Testing - Gartner has dedicated their latest Magic Quadrant report to one of the key components of application security – Dynamic Application Security Testing, or DAST. DAST is the real-time solution that examines an application in its running state – from the outside in - to find security vulnerabilities. Download now to learn more.
Cloud Security Best Practices 
  • Managing the security challenges of cloud computing
    The growing importance of cloud computing changes the security focus for many companies, Grant Buckler writes. "[F]or businesses using the most popular cloud computing services, security becomes less a hands-on matter of maintaining firewalls and more a question of choosing cloud service providers wisely and asking the right questions about their security practices," he writes. It's important to look for gaps in the security of your cloud providers and to encrypt sensitive information. The Globe and Mail (Toronto) (2/1) LinkedInFacebookTwitterEmail this Story
  • What to think about before moving to the cloud
    Cloud computing can provide scalability for a business, but it's important to be aware of the potential legal and data-security challenges, Richard Taggart writes. Among the factors to consider: whether your cloud provider has the proper certifications and how it handles the demands of multiple customers. "You don't want any other customer interfering with your data, application performance or security," he writes. E-Commerce Times (1/3) LinkedInFacebookTwitterEmail this Story
  • 4 risks of moving your data into the cloud
    While cloud computing can provide significant benefits, there are risks as well, writes Charles Costa of CJC Digital. Using cloud services raises the possibility that services may become temporarily unavailable and creates data-security issues, he writes. Before putting sensitive information online, you should consider how your company would be affected if it were stolen. (2/21) LinkedInFacebookTwitterEmail this Story
  • 9 ways to keep your intellectual property safe in the cloud
    Cloud computing can lead to concerns over the security of intellectual property. "[A] cloud provider's ability to protect intellectual property rights should receive as much scrutiny as the information security, price and technical solution," says Rebecca Eisner of Mayer Brown. To protect their most sensitive data, companies should carefully research cloud providers, push for favorable contractual language and be willing to pay extra for more-secure solutions, experts say. (2/6) LinkedInFacebookTwitterEmail this Story
Trust your software? While testing applications must be comprehensive, they should also be easy and cost-friendly. HP Fortify on Demand is a Security-as-a-Service testing solution that allows any organization to test the security of applications quickly, accurately, affordably and without any software to install or manage. Click here to read more.
Focus on Solutions 
  • Norton looks to the cloud to simplify password management
    Norton, a division of security firm Symantec, is testing a cloud-based password authentication tool that enables users to rely on a single master login to access multiple devices, such as home PCs, smartphones and tablets. Norton Identity Safe comes bundled with other security features, including Norton Safe Web, and offers enhanced protection for social networking. IT PRO (London) (2/2) LinkedInFacebookTwitterEmail this Story
  • HP releases tools for cloud security and migration
    Hewlett-Packard has introduced a suite of cloud security analysis and management tools for businesses. EnterpriseView looks for compliance violations and reports top vulnerabilities, bridging operations and security infrastructure. A compliance stack tool for cloud-based services will ease migration from local to public clouds and provide enhanced security. (U.K.) (2/27) LinkedInFacebookTwitterEmail this Story
  • Amazon, Check Point partner on cloud-security offering
    Subscribers to Amazon's cloud service will gain access to enhanced security tools under an agreement between the company and Check Point Software Technologies, a developer of virtual security appliances. Amazon Web Services will incorporate Check Point's cloud-based security gateways, enabling users to install and manage a variety of customizable security appliances and apply protocols virtually through a centralized interface. eWeek (1/4) LinkedInFacebookTwitterEmail this Story
  • Does your business use cloud computing tools?
No, but we're considering it
No, and we're not considering it

  • How comfortable are you with the topic of cloud security on a scale of 1 to 5, with 1 being completely uncomfortable and 5 being totally comfortable?

  • What is your greatest cloud computing challenge?
Dealing with vendors
Training staff
Security issues
Keeping abreast of the latest developments in the field
Operational issues


SmartBrief delivers need-to-know news in over 100 targeted email newsletters to over 3 million readers. All our industry briefings are FREE and open to everyone—sign up today!
Aviation & Aerospace
Construction & Real Estate
Consumer Packaged Goods
Food Service
Health Care
Media & Entertainment
Travel & Hospitality

Subscriber Tools
Today's Brief - Permalink | Print friendly format | Web version | Privacy policy

Account Director:  Roger Leek (804) 803-1414
SmartBrief Community:
Recent SmartBrief on ExecTech Issues:   Lead Editor:  Susan Rush
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2012 SmartBrief, Inc.® Legal Information