Cloud-based Security – The Need To Reconsider Security Approaches


The convergence of numerous trends is causing organizations to reconsider their approach to security.

While widespread email viruses and worms have decreased, attacks via the web are on the rise. This is because web browsers consolidate many applications ─ including those used for email, instant messaging, and ecommerce ─ making the browser an attractive launch pad for attacks.

Web 2.0 and other complex web technologies also open the door to new two‐stage web attacks and social‐engineering exploits.

1. In fact, during the first quarter of 2009, Web 2.0 services and sites led with the highest number of all recorded hacking incidents at 21%.

2. These new methods of attack are particularly dangerous, because they can originate from trusted sources or become embedded within legitimate and authorized email and web content.

Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization’s network security posture.  Cloud-based security is a red hot topic these days, but is it hype or the real deal?

Read this white paper

Follow Us!


Established in 2009, is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.