Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
James M. Connolly
July 16, 2023
5 Min Read
Brain light via Alamy Stock
The very nature of cloud computing raises security concerns. Gone are the days when an IT director could give a loving pat on the back to a disk drive loaded with vital company data. Today, your data -- corporate and personal -- is "out there".
Of course, even that in-house storage hasn't been truly secure since hackers came onto the scene.
While the cloud presents new security challenges on what seems a daily basis, smart companies are taking the initiative with security strategies that extend outward to their business partners, suppliers, and service providers.
As you will see in this Quick Study -- a compendium of InformationWeek cloud security articles from the past year -- experts are sharing their advice and experiences on how to make an enterprise cloud strategy as secure as possible.
A Cloud Security Snapshot
Cloud security is a shared responsibility between the businesses leveraging the cloud and their cloud service providers. Here are tips on how to build and maintain robust security models.
Chief information security officers must develop a comprehensive security investment strategy that considers human capital, even while qualified IT security professionals are in short supply. Red Hat says cybersecurity is taking precedence over innovation as the top area of investment in 2023.
Many enterprises still find cloud migration and management to be a daunting challenge, and are left wondering where to start or, more importantly, what to fix. Here’s how organizations adopting cloud-native architectures can bypass missteps on their migration journey.
Burdened by inertia, apathy, and obsolete technologies and practices, federal agencies have fallen behind in cloud adoption. However, progress has been made in giving agencies the guidance they need to make their cloud journey more secure.
Organizations must take active steps to maintain an accurate and up-to-date inventory of their data, with particular focus on identifying their sensitive data. Failure to do so could cost an organization customers.
Even when security teams take steps to manage and secure SaaS apps, the solutions they put in place to mitigate these risks are often insufficient. It’s time for a more comprehensive approach.
Cloud Security Best Practices
As organizations have shifted from basic cloud environments to distributed, microservices-based, cloud-native environments, the cloud security strategies that sufficed five or 10 years ago are no longer enough.
Rapid migration to the cloud continues, but the benefits of a cloud strategy must be balanced with cybersecurity. How can IT leaders assess their organizations’ cloud security posture? Asking nine key questions can shed some light on the gaps in cloud cybersecurity and how to start filling them.
Malicious actors are taking advantage of a plethora of new opportunities in the cloud. Here are the top cloud-native risks and strategies for avoiding them, courtesy of InformationWeek's partner Network Computing.
Migrating from legacy environments to the cloud requires changes to the way organizations approach DevOps, FinOps, SecOps and more.
Cloud is the future -- and those looking to migrate must do so strategically, and consider all the important organizational factors before diving in. Key to such a migration is overcoming the misconception that the cloud is inherently less secure.
Cloud migration has increased exponentially worldwide, and enterprises as a whole have benefited from the shift. But a “one-size-fits-all” approach may not be the answer for everybody.
Don’t let the words “cloud migration” tie you up in knots. A few simple tips can make a cloud transition much faster and easier, and a solid security strategy is one key.
Cloud Security in Fintech
Securing fintech organizations and their customer data requires ongoing efforts on the technical front, but those companies also must be conscientious about maintaining an atmosphere of trust. As such, ensuring best in class security protocols is critical.
Not having the right talent can lead to poor resource management performance and unnecessary cloud spending, as well as security risks and compliance issues. Difficulty sourcing talent looms as a potential security risk.
The cloud can offer financial services firms a flexible and scalable option for storing data and workloads, but a holistic security strategy is critical to ensuring regulatory compliance.
Tools and Technology
Google will offer Assured Open Source Software, the open source software it has vetted and uses internally, to enable enterprises to gain the benefits of OSS that has been verified as secure.
Data isn’t the only thing that’s siloed. Have you checked your security lately? You can implement security in a way that breaks down silos and covers every inch of IT.
To thrive in today’s multi-cloud environment, every enterprise IT team needs professionals with these 10 cloud computing skills. Topping the list is security.
The rise of hybrid work environments has widened the attack surface for adversaries. Zero-trust architecture is critical to securing functional operations.
About the Author(s)
Contributing Editor and Writer
Jim Connolly is a versatile and experienced freelance technology journalist who has reported on IT trends for more than three decades. He was previously editorial director of InformationWeek and Network Computing, where he oversaw the day-to-day planning and editing on the sites. He has written about enterprise computing, data analytics, the PC revolution, the evolution of the Internet, networking, IT management, and the ongoing shift to cloud-based services and mobility. He has covered breaking industry news and has led teams focused on product reviews and technology trends. He has concentrated on serving the information needs of IT decision-makers in large organizations and has worked with those managers to help them learn from their peers and share their experiences in implementing leading-edge technologies through such publications as Computerworld. Jim also has helped to launch a technology-focused startup, as one of the founding editors at TechTarget, and has served as editor of an established news organization focused on technology startups at MassHighTech.
You May Also Like