Premium Content

Access "Opinion: Infosec pros must advocate for cloud computing in IT"

Published: 13 Oct 2012

It’s no surprise that the use of cloud computing in IT is receiving a lot of attention.  Government and the private sector are both desperate to save money, and cloud providers, with their pay-as-you-go pricing models, promise a quick way to cut capital expenditures. But what about security? That seems to be the main point of contention stopping many organisations from taking full advantage of the new utility computing model. They just don’t know if it’s safe. This presents the security professional with a great opportunity. So often in the past, security people have acquired a reputation for saying ‘no’ to everything and blocking progress; now is their chance to make things happen and become a business enabler. Security people should evangelise the benefits of the cloud, while showing any major transformation of business processes needs to be based on sound risk-based principles. That way, organisations can avoid embarrassing mistakes and also take full advantage of the benefits cloud can bestow. The sooner organisations come to this realisation, the sooner... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...