{"id":254,"date":"2009-02-20T00:00:00","date_gmt":"2009-02-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/20\/storm-lingers-over-cloud-movement\/"},"modified":"2021-12-30T11:36:51","modified_gmt":"2021-12-30T11:36:51","slug":"storm-lingers-over-cloud-movement","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/20\/storm-lingers-over-cloud-movement\/","title":{"rendered":"Storm Lingers Over Cloud Movement"},"content":{"rendered":"<p>Everyone is talking about the race toward cloud-based computing, but apparently, most organizations aren&#8217;t rushing to embrace the emerging Web-based infrastructure as quickly as they might &#8211; based at least in part on concerns over security.  A new study into cloud computing adoption trends published by enterprise IT consultants Avanade and conducted by pollsters at Kelton Research finds that security remains a significant question in the minds of many C-level executives and IT managers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well, for one thing we can deduce that on the highest levels of IT management, security priorities still take precedence over the opportunity for cost-savings &#8211; since one of the biggest advantages promised by cloud computing is the ability to offload the expense of staffing and maintaining your own data centers.  Simply put, organizations just aren&#8217;t yet willing to trust some cloud services provider with every element of IT systems management.  If anything, the people surveyed know best how hard they&#8217;ve been working to keep an eye on their own stuff and obviously have to wonder if a service provider will care as much.<\/p>\n<p>As far back as 2007, SaaS market leader Salesforce.com confirmed that malware and phishing attacks being aimed at its customers had resulted from an incident involving one of its employees who was themselves swept up in a phishing scam and exposed the hosted applications vendor&#8217;s own customer database.<\/p>\n<p>On the flip side, if liability is transferred to the provider, the ongoing move to approach IT security strategy from the perspective of risk management could benefit cloud adoption.  For, if a company can offload a good deal of its risk onto service providers, for things like electronic data breaches, it would seem like that might make sense, especially if courts will allow companies to pass off the blame on hosted services providers when security breaches inevitably occur.<\/p>\n<p>http:\/\/securitywatch.eweek.com\/phishing_and_fraud\/storm_lingers_over_cloud_movement.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-254","post","type-post","status-publish","format-standard","hentry","category-blogging"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":2741,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/254\/revisions\/2741"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}