Protect Your Cloud-Based Assets

No business should rush into the cloud without fully understanding the risks associated with the technical, operational and organizational changes brought about by virtualization technologies.

In an article on the Computerworld website, Bill Brenner says putting more business infrastructure in the cloud has left companies vulnerable to hackers. That’s according to a survey he cites, the seventh-annual Global Information Security survey conducted earlier this year by CSO and CIO magazines and Pricewaterhouse Coopers.

“IT organizations often make an attacker’s job easier by configuring physical and cloud-based IT assets so poorly that easy-to-find-and-exploit flaws are left behind,” Brenner writes. Survey respondents cited vulnerabilities that include problems with misconfiguration, poor implementation of their virtualized environments, as well as inadequate training and insufficient auditing of computer systems.

To read the Computerworld article, please click here:
http://www.computerworld.com/s/article/9139974/The_Curse_of_Cloud_Security?taxonomyId