From an attacker’s perspective, cloud providers aggregate access to many victims’ data into a single point of entry. As the cloud environments become more and more popular, they will increasingly become the focus of attacks. Some organizations think that liability can be outsourced, but no, and I hope that we all understand it cannot. The […]

Read More

“Amazon is migrating the applications and services that run Amazon.com from a traditional infrastructure to Amazon’s IaaS division on an application-by-application basis. That’s called “eating your own dog food,” and it should give enterprises enormous confidence in the security of Amazon’s IaaS offerings.” “Security in the cloud is strong, and it’s being strengthened every day […]

Read More

Tech blogger? Why not get paid for your research and writing? Learn how.

The IOD website uses cookies. By clicking, you confirm acceptance of our cookie policy.
Logout
Please select one of the following:
Full Name
Email
Company
Job Title
Website
Expert?
Yes
Yes
Yes
No
What's your area of expertise?