Access your Pro+ Content below.
The security divide between on-premises and cloud infrastructures
Fenwick & West LLP's IT services are delivered through a hybrid of on-premises, software-as-a-service and cloud infrastructures. "As we straddle the cloud and on premises, our security problems have just broadened," said CIO Matt Kesner.
The Silicon Valley law firm's experience is typical of the growing number of companies that are running into legacy security obstacles as they move workloads to the cloud. Security technologies designed to protect enterprise applications and data on premises are often ill-suited for cloud infrastructures. We talked to security executives and analysts about what to consider when you're tasked with integrating legacy security systems with cloud services.
Corporate boards must be ready to defend their fiduciary decisions, compliance actions and, perhaps soon, even cybersecurity preparedness. A growing number of companies are seeking cyber-savvy board members, but it's still far from a majority. Should companies add board members with cybersecurity or cyber-risk experience? We look at both sides of the debate.
Western Union rolled out a strategy to help its workforce take advantage of cloud services. The program -- dubbed Western Union Information Security Enablement, or WISE -- involved bringing shadow IT into the light, approving cloud services for official use and adding the necessary controls and policies to secure cloud infrastructures. We catch up with the company's senior manager of information security to find out how it's going.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Traditional security tools designed for data centers don't work well in cloud environments. New approaches are needed, according to security executives. Here's how to survive the chasm.
Mike Bartholomy of Western Union explains how the financial services company has embraced employee use of cloud services and how his team approves and secures these applications.
Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.
Columns in this issue
While the effectiveness of traditional security controls depends on the cloud model, many security vendors still need to add cloud delivery to their tools.
Worried about bad statistics? Marcus Ranum asks the former lead analyst of the 'Verizon Data Breach Investigations Report' about storytelling with data.