PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2015 Volume 17 / No. 7

Five ways CIOs build hybrid cloud security

As CIOs adopt hybrid cloud strategies, some quickly learn that force-fitting traditional security methods to public and private clouds, or some combination, doesn't work. Whether it's migrating non-sensitive workloads to off-site data centers or standardizing cloud-based tools at global business units, the business value of these strategies hinges on effective security programs. In this issue of Information Security magazine, we look at what CIOs have learned so far about hybrid cloud security, and the native-cloud and cloud-first technologies that are easing these transitions.

Along with migration toward cloud, more companies are faced with protecting IP and other assets as mergers and acquisitions gain momentum. CISOs are increasingly brought into M&A due diligence to help evaluate the information security of acquisition targets. Integrating systems and ensuring application and data security before, during and after M&A requires a unique set of survival skills. We outline key actions during different stages of the process.

Federal government agencies are conducting a 30-day cybersecurity sprint after the U.S. Office of Personnel Management's disclosure that its systems were breached. Despite numerous security warnings, OPM used a decentralized approach to security. We look at the lack of accountability and InfoSec leadership and why, in an age when nation-states represent a national security threat, security professionals still face an uphill climb in some government agencies.

Features in this issue

  • How to best employ cloud-based security services

    by  David Strom

    The cloud-based security services market is booming, as enterprises adopt email, Web security, and identity and access management SaaS. How can CISOs best combine cloud-based security controls with on-premises security programs? This Beyond the Page looks at the latest cloud security services and best practices.

Columns in this issue

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

-ADS BY GOOGLE

Close