Top Cloud Security Threats Include Misconfiguration

Top Cloud Security Threats Include Misconfiguration

The shared, on-demand nature of cloud computing can only lead to more concerns about data security on one hand and often forgotten areas like misconfiguration on the other. Best Practices Begin with a Solid Cloud Adoption Strategy The Cloud Security Alliance (CSA) actually pegs misconfiguration as a very real component to security threats. The Alliance is the leading global organization that not only sets “standards, certifications as well as best

IT Decision Makers Are Challenged with Mobile Security and Compliance

IT Decision Makers Are Challenged with Mobile Security and Compliance

The digital landscape is alive with change, particularly when it comes to the proliferation of mobile devices (BYOD) in the workplace. The dawning of this phenomenon began as far back as 2009, when the phrase first took hold, becoming, as CIO notes, the ‘New Normal’ in 2013: “CIOs can thank mobile device management vendors for pushing their messages of compliance to business users and, as a result, helping bring IT into