Access your Pro+ Content below.
Infosecurity: Information security vendors lag threat vectors
This article is part of the June 2011 issue of IT in Europe
As a snapshot of the state of our industry, the Infosecurity Europe conference in April underlined the extraordinary pace of change that enterprises are facing. In 2010, the security implications of smartphones and cloud computing were just coming on the agenda; a year later, these threat vectors took centre stage. Successive debates and panel discussions at this year’s conference revealed a growing concern over these twin trends that apparently seem unstoppable since cloud computing is cheap, and smartphones are sexy. In both cases, it seems organisations are falling over themselves to adopt these technologies without letting security considerations get in the way. The economics of cloud computing make it hard to resist, especially for companies struggling to cope with the long recession. As many Infosec exhibitors reported, organisations are desperate to reduce both their capital expenditure and their operational overheads. Cloud services can fulfil both those aims, and they may even improve security by applying a level of ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Products to secure smartphones and cloud computing are in short supply.
For DPA compliance, a ‘tick-box’ approach is not an option. Therefore, the trick is to simply to keep out of trouble and avoid obvious negligence. Alan Calder explains how.
News in this issue
Can organisations expect a more prescriptive Data Protection Act in the future? UK Bureau Chief Ron Condon examines the law's prospects.
The Kaspersky kidnapping serves to remind that threats to some information security pros involve more than stolen credit card details.