Collecting personally identifiable information, or PII, presents special obligations, and when this data is stored in the cloud, the responsibility typically falls on the cloud customer, writes Steve Durbin, global vice president of the non-profit Information Security Forum.
A new study by KPMG International confirms what many IT departments have learned the hard way: cloud computing isn't as cheap and easy as it's often made out to be. Vendor puffery suggesting that moving to the cloud eliminates complexity has only added to the difficulties.
The majority of companies using the cloud have business managers who are signing up for services without consulting IT. These "rogue clouds" were deployed at 83 percent of the large enterprises recently surveyed by Symantec, and they're among IT's biggest challenges, reports Ellen Messmer at NetworkWorld .
Fears of data exposure continue to make enterprises hesitate when considering cloud computing services, and encryption is one way to reduce the risk that sensitive data could be compromised via a cloud provider. However, the methods that cloud vendors use for encryption vary considerably and that has an impact on how secure your encrypted data really is.
Pssst. Know anybody who wants some cloud computing real cheap, as in free? All you have to do is misuse cloud providers' browsers and you can live like a parasite off their power, reports Thomas Claburn at InformationWeek .
Enterprises have been loud and clear about ongoing security concerns regarding cloud computing, but by and large, vendors haven't responded with robust service level agreements or any other reassuring controls, experts say. Customers should be on the lookout for nine controls that could relieve their concerns, reports Brandon Butler at Network World .
A poorly implemented BYOD strategy could result in accidental data disclosures due to a porous boundary between work and personal data, and as a result of more business information being held in an unprotected manner on consumer devices, warned the Information Security Forum.
Cloud computing is gaining momentum and driving more bandwidth consumption as businesses large and small increasingly take advantage of the opportunities cloud provides. But this segment faces some significant threats to its future growth.
To address corporate concerns about the security of BYOD, IBM has released a number of security products targeting the enterprise mobility market, including a mobile security framework.
A full 88 percent of mobile devices owners use their personal devices in the workplace, yet only 37 percent have malware protection for those devices, which exposes companies to the risks of data theft and network disruption.