ComputerWeekly.com
Premium Content

Access "Infosecurity: Information security vendors lag threat vectors"

Published: 13 Oct 2012

As a snapshot of the state of our industry, the Infosecurity Europe conference in April underlined the extraordinary pace of change that enterprises are facing. In 2010, the security implications of smartphones and cloud computing were just coming on the agenda; a year later, these threat vectors took centre stage. Successive debates and panel discussions at this year’s conference revealed a growing concern over these twin trends that apparently seem unstoppable since cloud computing is cheap, and smartphones are sexy. In both cases, it seems organisations are falling over themselves to adopt these technologies without letting security considerations get in the way. The economics of cloud computing make it hard to resist, especially for companies struggling to cope with the long recession. As many Infosec exhibitors reported, organisations are desperate to reduce both their capital expenditure and their operational overheads. Cloud services can fulfil both those aims, and they may even improve security by applying a level of discipline and professionalism ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • FT sold on cloud benefits
    CWE_200115_ezine_18p_MED.jpg
    E-Zine

    In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further ...

  • The Global Risk Report 2015
    GlobalRisks2015.jpg
    E-Handbook

    Large-scale cyber attacks are among the prominent risks in 2015 in the 10th Global Risks report from the World Economic Forum.

  • CW Buyer's Guide: Emerging technologies in networking
    prem_BG_1214_networking252.jpg
    E-Handbook

    Check out this extensive buyer's guide to explore technologies designed to improve networking and for an inside glance at what established suppliers ...