The Holistic Application of Cloud Security (a white paper excerpt)

The following is an excerpt from the  executive summary of CloudAccess’ latest white paper titled “Applying Security Holistically from the Cloud: A Paradigm Shift of Applying Situational Awareness in SIEM deployments. The network perimeter is gone. By means of suppliers, customers, vendors, employees and other users gaining access to intellectual property, transiting personal and financial data on a network from a variety of secure and non-secure end points, the old notion of network security is antiquated and dangerously narrow.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Advertisements

FFIEC’s recognition of cloud security advantages is good for modest financial orgs

How credit unions, smaller banks can now use outsourcing for compliance using security-as-a-service. Last month the Federal Financial Institutions Examination Council (FFIEC) shared an opinion on the viability and security of cloud computing. In the four-page statement, the interagency body empowered to prescribe uniform principles, standards, stated that cloud computing is “another form of outsourcing with the same basic risk characteristics and risk management requirements as traditional forms of outsourcing.”

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

 

Do you leave your keys in the car too?

I heard the sky was falling. Well, at least the cloud was plummeting groundward. And all it took was one tech journalist to get his iCLoud account (and essentially his entire digital footprint) hacked. Several well-known tech-heads have added their voice to chorus of cloud-bashers. There are a couple reasons why this latest round of Chicken Little prognostications are baseless. Bottom-line, security is only as good as its process. Whether it is cloud-based, or is created to protect assets in the cloud, if you are not minding the store, candy will get stolen.

READ THE ENTIRE ARTICLE FROM THE NEW CLOUD ACCESS BLOG SITE: HERE

The DNA of Cloud Security

Just because you access an application from the Internet, does NOT make it a cloud solution. It might look like a duck and quack like a duck, but when you look at its DNA, it’s more like an old goose. So what?  If it doesn’t have the proper “cloud DNA,” it means the end user organization is not realizing the oft-hyped benefits and true ROI the cloud promises.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE