Category Archives: Security

Insider Threats To Cloud Computing

Insider Threats To Cloud Computing

Cloud computing uptake by businesses has shifted the general model of organizational information complexes. Business enterprises have a lot of data to store and use. Even as they shift to the cloud, there are major dangers around security. In most cases, breaches to cloud-stored files happen because of insider conspiracy, malpractice, and malice.

This article looks at four common insider threats to cloud computing and ways for organizations to avoid them. All this is intended at making the cloud shift worthwhile for businesses.

Malicious administrators

Cloud computing as a process is governed, managed, and maintained by site administrators. By default, they hold the key to managing all the data, files, and privileged company resources and files. Sometimes, relationships with employers don’t work. As a revenge, or for other reasons, administrators may end up spreading, or allowing privileged information to leak at the expense of the business enterprise involved.

The best way businesses and cloud providers can protect themselves from these actions is by breaking protocols and clearance. This should happen at all levels of engagement—at company and provider levels—and can limit the risks to a single part.

Tech-savvy insiders

Being privy to company secrets is exciting. Many insider tech-savvy individuals can use their knowledge of the weaknesses in a company’s security to breach clearance and access privileged information. Many of these are hackers in need of attention and self-respect. Some are harmless, but some are harmful. The worst kinds among these are malicious insiders. Many would like to find out company’s confidential data to sell it to the highest bidder. Businesses need to work hard to seal all local security vulnerabilities and ensure such individuals are known beforehand. Companies should also vet their employees for records that look dubious or conflicting.

Insiders who attack their own companies

Different kinds of people react differently to challenges. Some employees may choose revenge when they think they’ve been mistreated by their company or employer. A common ground is attacking the employer’s cloud applications and functions. These individuals might be motivated by revenge, but since they are not tech-savvy, they use outside tools or people to breach security protocols.

Poor internal enforcement

Many business enterprises assume that all cloud applications run by themselves. To them, the cloud is self-regulating and managing. As such, they play no role in managing their cloud applications. In most cases, this is done out of ignorance or incompetence.

When this happens, a business enterprise’ cloud applications become vulnerable. Attackers and insiders alike find such systems easy to beat because the managers sleep on their jobs. This is a common problem among huge corporates where responsibility is not streamlined.

Overall, the ‘inside job’ is responsible for most cloud computing security woes. Enterprises have to become proactive in finding solutions to their security threats to protect their sensitive information.

By Walter Bailey

Why IaaS Is The Easiest Phase Of Data Security In Cloud Computing

Why IaaS Is The Easiest Phase Of Data Security In Cloud Computing

The cloud is expanding everyday and no longer looks like the shapeless puffy fleece that was until recently. The post-millennium years have seen cloud computing tighten to the bursting point since many entrepreneurs have been trying to rent space on their own. There are many ways to approach the topic but the easiest is Infrastructure as a Service (IaaS)—the network in layman’s language. Everything that happens on the web has to pass through the many channels going to and fro the data centers.

This is why when approaching security in cloud computing, one has to begin at the IaaS platform. Unlike other services, like SaaS, the user has no frustrating role to play here. Everything happens courtesy of the hosting platform that takes care of all safety concerns. This is because the center has machines that hold intact the data from various webmasters and intranets in order to keep the business running.

The problem with this service is associating it exclusively with running a data center. In reality, this is only the starting phase of securing the platform. There are many other ways that hosting networks can do to improve the cloud.

Data centers

The first point to keep hands off is the data center. This is where the storage equipment lies and demands both hardware and software safety measures. Many users keep backup programs in case of inadvertent loss. They also keep the machines in an area with optimal temperatures, such as basements.

First Step: Logging sheet

After keeping the server facilities physically safe and internally secure, cloud operators can now move on to the first step. This goes beyond the data facility and refers to controlling whoever comes into contact with information or resources going into or out of the server. The easiest way to do this is to keep a logging sheet. This should be as confidential as possible so that no hackers get their hands on it and track down private information channels. This way, one is able to know which agency runs through the data conduit and what its responsibilities are.

Second Step: Encrypting everything

The second step of security in a cloud computing environment is the encryption of the documents that are in the network, including those that go to the customers. The IaaS environment is notorious for only securing the database’s documents but not those of possible clients outside its hosting. If both types of documents are secured, the cloud becomes secure throughout. The customer who runs a site or makes online purchases needs not to further secure data that comes from such a server.

Final Step: Authenticating

Authentication at the access point is an essential step in IaaS applications. The provider should assign high-end identity details to subscribers before they come into the network. This also applies to the various intranets that have their private clouds running through this master server. It should be the foresight of the operator to give similar ID protocols to private networks that act the same, while giving more exclusive networks original identities. This is after considering the relative trustworthiness of each of the stakeholders.

Following these steps makes the cloud computing environment that runs on an IaaS platform such a trouble-free one. The platform is more than skin deep—it gives physical safety to the database but it also concentrates on the entire information conduit.

By John Omwamba

Leverage Social CRM, Billing To Better Engage And Understand Your Customers

Leverage Social CRM, Billing To Better Engage And Understand Your Customers

If your organization is doing business in the cloud and SaaS space, you know it’s all about managing your funnel and your opportunities. The entire organization needs to focus on streamlining the quote-to-cash process. However, you also need to consider the business buzzword of the year: “social.” There’s social media, the social enterprise, social games, apps and more. But let’s bring social back to its roots; social is really about communicating and understanding one another. In fact, “Know thy customer” should be a core tenet of any business. Social media and online service businesses simply enable far more touch-points by which to know your customers. Business owners can monitor what customers say and then capture basic information to manage customer relationships, but transactions and purchases provide insight to further define the relationships. It’s the financial details that provide unique context to each relationship. From the time you provide customers with a quote to the time they pay, the relationship is transitioning from a personal one to a monetary one. The relationship could be a subscription like Pandora, a contractual relationship like insurance or a metered usage relationship like downloads or compute power. But like most relationships, it is the details that provide the context. And to drive additional SaaS recurring revenue, you need that context.

The challenge today, however, is that the most popular customer relationship management (CRM) solutions are predominantly sales contact and lead management tools. Their ability to understand service businesses is rather limited since they were designed for a SKU-based world. They are ill equipped to understand the changing financial elements and touch-points of a modern service. This is why CRM applications need to integrate with billing applications that can model the full details of established agreements.

By integrating their CRM solutions with billing applications, businesses can bring key elements of modern service relationships from the billing system’s “brains” directly into the user interface (UI) of the CRM. In doing so, a business can release the power of social CRM and gain a substantial return on investment from these tools.  For example, in a business-to-business environment, a sales representative often needs to provide his customer with a quote. If he can easily reference advanced product elements within the billing system and generate quotes for various service elements, he can engage the customer and present him with a quote in the context of the moment. If the customer agrees to the order, the sales rep can initiate the sale and enrolment directly from the CRM screens he knows best. This newer quote-to-enrolment workflow removes many of the silo hassles found in enterprise sales environments. In addition, the billing system can generate appropriate notifications to a service or provisioning platform and take over the forward monetization of that customer.

Access to the financial position of the business and the customer enables deeper interactions with customers in real time. If a sales rep has access to the financial history between a customer and the company, he can better serve his customer. If the customer is actively talking about a service issue, the sales or service rep can pro-actively assess the situation. If the customer is of high value, the rep can assist in saving the customer, but if the customer is on a free trial or freemium model, the sales rep will have had little interaction with him. In a cloud and SaaS business model, customer metrics are foundational. By presenting monthly recurring revenue (MRR), annual recurring revenue (ARR) and the contract or lifetime value (LTV) of the client into the CRM system, a sales rep has a far better visibility into the client.

In SaaS, clickstream activity also allows for a richer social understanding by comparing the behaviours of customers to other cohort groupings. Based on real-time analysis of a customer’s activity, businesses can up sell more effectively, since they are more aware of specific customer needs, but timing is key. Reaching out to customers after their moment of need may only be partially successful. The future of CRM will require integration of both real-time behavioural analysis and the ability to automatically respond to the customers.

So in order to move from quotes to customers to revenue, start with the billing system. It is the billing solution that models the unique relationship elements needed to support today’s consumptive, service-based economy. Then see what integrations and API documentation are offered to support a quote-to-cash model. Some of the most advanced billing systems today offer off-the-shelf package integrations through marketplaces like www.salesforce.AppExchange.com. By downloading the package, one can extend the hierarchical and service-based financial elements of the billing system into the CRM UI. This can help remove much of the relationship friction today’s service businesses face. Additionally, if your business employs a self-service model, it can leverage APIs to enrol customers directly via the billing system and sync that with the CRM, which can then be accessed by support or account management teams.

Ultimately, we live in a relationship-defined world, and relationships grow as parties share information. By presenting a more complete understanding of a customer to the individuals or systems that must support him, companies gain a far better perspective, of the customer’s service needs and his value to the business. Additionally, today is the age of the API. APIs real value is to allow unfettered connectivity between systems. SaaS businesses that have data silos can be crippled by lack of data visibility.  However, businesses can now tear down system-based silos that characterized yesterday’s marketing, sales, operations and finance and support organizations. Contemporary models enable the two currents of billing and CRM to converge, allowing businesses to better know their customers and remove the friction that prevented more effective monetization of customer relationships.

The future for cloud, SaaS and social business models is focused around the power of social CRM and billing data combined. It is not just about tweeting, AdWords or liking a Facebook business page. Social CRM and billing involves building a complete relationship model and holistic financial picture of the customer. Only then can a SaaS business engage and respond to customers in valuable ways that impact the bottom line of the organization and drives organizational valuation.

By Scott Swartz

Founder and CEO of MetraTech: Scott has more than 20 years of experience in the software and services industry. Scott founded MetraTech in 1998, after spending time at NetCentric, an early entrant in the business of cloud computing and where he created the industry’s first SGML/XML billing protocol. Before NetCentric, Scott was a Director at Cambridge Technology Partners, a pioneer in the delivery of client/server solutions for large enterprises. At CTP, he led the deployment of complex customer care, billing, and logistics solutions for Fortune 100 and 500 companies. Scott holds a bachelor’s degree in electrical, computer and systems engineering from Harvard University. 

Cloud Computing Is Making A Leap In Space Technology

Cloud Computing Is Making A Leap In Space Technology

Cloud Computing Is Making A Leap In Space Technology

Writing six ginger bytes of data every 1/60th of an hour is a daunting task. It might even sound mind-boggling for those outside the scientific community. However, the reality is true of a current mission in Europe that endeavors to chart the universe in its entirety using advanced servers. The mission will compute biological issues like biometrics, study rocks beyond the Milky Way, and explore planets in and outside the Solar System. What is the tying factor to all these? It is, undeniably, cloud computing.

Mars Rover: a fresh example

The most recent example of how cloud computing is changing the outlook of far-flung science for ordinary mortals is the Mars Rover project. It is now possible to create forums that can follow the exploits of the space probe vehicle on its maiden career on the rocky, uninhabitable terrain. It is no longer the fiction of Ray Bradbury about a Martian invasion that people will be reading. Rather, they will be reviewing real-time pictures of the Martian terra firma to disclose how to chart the fourth planet from the sun. Indeed, people can use these forums to debate how to alter earlier boundaries of craters that early missions to Mars showed post-2004.

One of the mysteries that have always surrounded Mars, which cloud computing can help resolve, is the crater that resembles a human face staring into the stars. The most recent photos from the current probing mission show even more stark details about this phenomenon.

Cloud computing as a spatial collaboration

Other than Mars, there are many more lands of opportunities at the behest of would-be scientists. People can use video teleconferencing to showcase experiments and discuss important discoveries.

As a collaborative effort, the cloud acts as a perfect channel for storing data without fearing that the magnitude of the research will exhaust server memory. Indeed, this need not be so, since cloud computing thrives on tenancy. One only uses the space when there is need to. This is why the Americans have maintained their earliest rovers on the ‘red planet’ even after the times of these special vehicles are over. They can still rent room in datacenters dedicated to scientific research for the probing vehicles when need be and not always.

The frontier in space is expanding day by day due to keen interest by every brilliant mind out there. Years are gone when a select team in a national space agency not only made policies but implemented them entirely. Cloud computing now welcomes the views of independent researchers in space technology. They can perpetuate their views forward using their private clouds. Who knows; maybe the leading space agencies may discover them one day.

Another inspiring advancement in the cloud is nanotechnology. Micro physicians are challenging themselves with the query: if a toothbrush can fix a problem that would take months on earth to do on a space craft in space, why not them? Interestingly enough, large corporations in the computer industry are joining in. They make model programs that can act as a benchmark for future space studies. For example, there is now a new platform that is affording upcoming science graduates from the US to trace the Rover as it sends reports back to earth. This PowerPoint-like software will allow them to take pictures and inscribe them with maps, and captions. These efforts by graduates may later prove to be the quintessential charts for Mars.

Cloud computing is also according the satellites circling the globe independence from their human makers. These satellites relay information using standards that are easy to assimilate. Scientists can track them, but do not need to stay with eyes open because the objects have a semi-autonomous model of checking weather patterns, analyzing rock formation and helping with radio signals. They send reports back to the surface in preset times, meaning that they are in a private cloud that operates on its own, though the larger public can take advantage of their byproducts including clear radio signals and satellite television reception.

Becoming space citizens

It is inspiring to note that a site that has come in the wake of the recent missions to the red planet has attracted a virtual world of its own. The federal site has now a population of fifty-four thousands citizens. The citizens exchange notes, in forums and via chat. They discuss the latest reports from Rover that seem to come from their own planet. They can even improvise ways for the space rover to look for more evidence about the existence of water in the craters of Mars by offering suggestions. The NASA scientists behind the project may take a look at some brilliant suggestions and feed this into the craft’s program.

Science fiction movies and novels are no doubt becoming a stable reality through the interactions of cloud computing. The majority who know that they are some of the 99.9% who will never leave earth as space tourists can now live the experience when hidden behind their computer servers. They merely need to interact with other knowledgeable minds whenever a new rocket launches. They can follow it using the fruits of nanotechnology and cloud computing.

By John Omwamba

Air Traffic Management Set To Meet Cloud Technology

Air Traffic Management Set To Meet Cloud Technology

After revolutionizing domains like industrial design and engineering simulation, cloud computing is now set to drastically modify air traffic management technology.

In a recent proceeding, General Electric Company and National Aeronautics and Space Administration (that’s NASA) have teamed up to undertake a project aimed at incorporating cloud computing into conventional air traffic management solutions. The multi-million dollar arrangement will permit airline personnel and air traffic experts to carry out their usual (and utterly critical) business in an efficient manner.

As an outcome of the project, flight critical real-time information will no longer be the only valuable data presented to air traffic controllers and airline staff. Novel data analytics framework and assessment support tools would also be made readily available, streamlining airport operations, and enhancing overall aircraft safety. According to Liling Ren, project leader at the GE Global Research Division,

“Cloud computing has the potential to fundamentally change how air traffic management operates today. With the transition to it, airlines, pilots and air traffic controllers will be able to achieve increased information exchange, sharing of decision support automation capabilities that tell them more accurately and reliably about a plane’s current position and future flight path.”

GE is confident that the project will lead to improved traffic flow and streamlined route configuration contributing significantly towards seamless, resourceful, and on-time travel for air commuters.

Understanding how air traffic control personnel, airline staff, and cockpit team can coordinate more efficiently within the context of a cloud-powered setup remains the main research question of this project. The traditional air traffic management architecture relies heavily upon systems managed and hosted independently by each of the three sections. However, a cloud-fueled setup would permit the parties to access practically inexhaustible computational resources and storage space. It is speculated that the project would hasten the evolution of air traffic management technology, elevating it to a level that would have taken years without the mighty cloud push.

Cloud endorsement has already directed commercial airlines towards billions of dollars in the form of returns, savings, reduced maintenance expenses, and condensed operational costs. The concept of fusing cloud computing into air traffic management will continue to bring fiscal gains for the companies. For the passengers, it would mean a superior degree of predictable air travel, both in terms of timeliness and comfort.

In addition, the project would bring GE a step closer to the real-world realization of its ground-breaking initiative—the Industrial Internet. The initiative signifies a disruptive progression in product design and development, a sophisticated network of smart machines that redefine efficacy and operational resourcefulness.

By Humayun Shahid

Top 5 Cloud Computing Trends Of The Future

Top 5 Cloud Computing Trends Of The Future

Cloud computing as a technology trend has caught up fast in recent years. It has revolutionized IT in a way never seen before. It has clearly changed how the traditional software works for businesses. This has many benefits, considering many of the former models are rather physical, coupled with expensive licenses. Cloud computing is a dynamic technology and the following are some of the trends that experts and analysts have identified.

1. Cloud computing is scaling investment value

Cloud computing streamlines how software, business processes, and services are accessed. More than ever before, this is helping businesses scale operations and optimize their investments. This is not only through lower costs, efficient business models, or greater agility in operations. It has a lot to do with how businesses use it to optimize their investments. In the same breadth, businesses are scaling into more innovation with their IT capacity. This will certainly help them make more investments and draw corporate income.

2. The emergence hybrid cloud computing

Hybrid cloud computing combines local and cloud computing. Businesses are using cloud computing (both private and public) to supplement their internal infrastructure and applications. Experts predict that these services will optimize business process performance. The adoption of cloud services is a new development in business functions. Under these circumstances, scaling down on the strengths of both worlds will become a common feature, if it’s not already happening as it is.

3. Growing popularity for cloud-centric design

More than ever before, organizational design is incorporating cloud computing migration elements. This simply means the need for optimal cloud experiences is on top of the list of the companies that are adopting this technology. This is a trend that is expected to grow more as cloud computing expands into different industries.

4. Cloud services optimized for mobile

The future is firmly mobile, one way or another. The exceptional rise in the number of mobile devices— tablet computers, iPhones, and smartphones—comes into play here. Many of these devices are used to scale business processes, communications, and other functions. To make cloud computing useful to business owners and employees, the cloud is taking a ‘mobile’ approach. More cloud computing platforms and APIs will become accessible on mobile.

5. Security

Cloud computing security is one of the most documented cloud computing issues. People are worried about the security of the data they store in the cloud. Because of this, you should expect to see more secure security applications and techniques coming up. The number of new encryption techniques, security protocols, and so much more will grow in the future.

By Gregory Musungu

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest.

A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and IT leaders with insight into the maturity of cloud computing and will help identify any changes in the market.  The report, released today, provides detailed insight on the adoption of cloud services among all levels within today’s global enterprises and businesses, including the C-suite.

The study reveals that cloud users in 50 countries were least confident about the following issues. Read Press Release

Read The Results: ISACA_CSA_2012_Cloud_Market_Maturity_Study

 

Source: ISACA

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence

New Research by Cloud Security Alliance and ISACA Identifies Government Regulations, Exit Strategies, and International Data Privacy as Top Concerns

Rolling Meadows, IL, USA (27 September 2012)—Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest.

A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and IT leaders with insight into the maturity of cloud computing and will help identify any changes in the market.  The report, released today, provides detailed insight on the adoption of cloud services among all levels within today’s global enterprises and businesses, including the C-suite.

The study reveals that cloud users in 50 countries were least confident about the following issues (ranked from least confident to most confident):

1.     Government regulations keeping pace with the market (1.80)
2.     Exit strategies (1.88)
3.     International data privacy (1.90)
4.     Legal issues (2.15)
5.     Contract lock in (2.18)
6.     Data ownership and custodian responsibilities (2.18)
7.     Longevity of suppliers (2.20)
8.     Integration of cloud with internal systems (2.23)
9.     Credibility of suppliers (2.30)
10.  Testing and assurance (2.30)

While there are many positive indicators that support the planned adoption and perceived use and value of cloud services in the years ahead, there remains much progress to be made to engage and gain the buy-in among business leaders.

As a first step, we as an industry must still work to provide a clearer definition of what cloud is and how the many innovative and secure services can help positively impact today’s businesses,” said J.R. Santos, global research director at CSA.  “But, we need to start at the top and engage senior management. Cloud needs can no longer be thought of as a technical issue to address, but rather a business asset to embrace.”

The survey includes responses from more than 250 participants from nearly 50 countries, representing a global group of cloud users, providers, consultants and integrators from 15 industry segments. Participants, 85 percent of whom identified themselves as cloud users, were asked to rank on a scale of zero to five a number of considerations in cloud computing including:

·         Use of cloud services and level of satisfaction
·         Factors in making cloud decisions
·         Level of cloud maturity
·         Innovation in the cloud
·         Expectations about the cloud
·         Cloud support for business goals
·         Forces that influence adoption and innovation
·         Confidence and optimism in the cloud market

“One of the most interesting findings is that governance issues recur repeatedly on the list of the top 10 concerns. Cloud users recognize the value of this model, but are wrestling with such questions as data ownership, legal issues, contract lock-in, international data privacy and government regulations,” said Greg Grocholski, CISA, international president of ISACA. “As cloud services continue to evolve, it is critical that we work together as an industry to provide insights and recommendations on these issues so that service and solution providers can look to innovate and deliver what the cloud services market needs to advance and what enterprises need to succeed.

Results Overview

Results of the study provide much insight on the progression of cloud adoption. For example, business enablers (score 4.08) rather than financial considerations (score 3.5) are the primary factors in making cloud decisions, with the least important factor being the ability to reduce the environmental footprint of the organization (score 2.67). The business enablement factors that most influence cloud computing decision making are related to the reliability and availability of services (mean score 4.59) and quality of service (score 4.29).

Overall, respondents feel there is room for improvement when it comes to innovation in the cloud. Nearly one in four (24 percent) survey takers indicate that there is no or limited levels of innovation in the market.  Forty-three percent of respondents believe there is a moderate level of innovation, while 33 percent report that the level of innovation in terms of products, services and business use is significant.

Survey results show that CIOs and IT management understand cloud best and are most involved in driving cloud innovation in their organizations. This limits cloud maturity and innovation since cloud continues to be viewed as a technical solution and not as a business enabler,” said Yves LeRoux, a member of CSA and the ISACA Guidance and Practices Committee.  “Cloud can provide business-building innovation, but to get to that point, there needs to be more buy-in and a better understanding among business leaders and C-level executives of the cloud’s value and risk.”

Nearly all respondents feel that cloud computing is far from reaching maturity, with only software as a service (SaaS) cautiously placed at the earliest state of growth level, with infrastructure and platform services still considered in the infancy stages.

Still, the respondents remain moderately confident that cloud services are meeting service and strategy expectations and that problems are being addressed. Many rated cloud services as providing confidence in strategy and problem resolution (means score 3.47), indicating cautious optimism that cloud will advance in maturity and problems limiting its adoption will be addressed.

The full survey report is available at www.isaca.org/cloud-market-maturity and https://cloudsecurityalliance.org/research/collaborate/#_isaca. ISACA and CSA will discuss the study’s findings and implications in a webinar on 11 October. Visit http://www.isaca.org/webinars to register.

About Cloud Security Alliance

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

About ISACA

With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) designations.

ISACA continually updates and expands the practical guidance and product family based on the COBIT framework. COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. Follow ISACA on Twitter at @ISACANews.

Source: ISACA / Cloud Security Alliance

CloudTweaks Comics
5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…