The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an up-to-date guide to help cloud users and providers make informed decisions about risk mitigation within a cloud strategy.
Today, the development of the cloud service model delivers business-supporting technology more efficiently than ever before–but with ease and convenience comes risk. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes and best practices are taken into account. In the absence of these standards, businesses are vulnerable to security breaches that can erase any gains made by the switch to cloud technology. Read More