Secure Cloud Computing The future of Information Technology Management

Shahani, Kartik
January 2011
Siliconindia;Jan2011, Vol. 14 Issue 1, p44
The article offers information on the role of cloud computing in information technology (IT) management. The author says that information security will allow cloud computing to maximize the Internet, turning IT models inside out. It discusses the points that must be addressed by organizations to move their business process into the cloud, such as proving the security of the infrastructure supporting their processes and data, accountability, and compliance and security assessments.


Related Articles

  • Security Breaches Go Mainstream.  // Credit Union Journal;4/2/2007, Vol. 11 Issue 13, p16 

    The article discusses the data security breaches in several credit unions and how CO-OP Financial Services is trying to solve these problems. These incidents are costing institutions to manage the effects including member card replacement, account changes and communication. Through key...

  • Cloud Computing. Mey, Susanne // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p18 

    A conference paper on the function of cloud computing on data security in the information technology (IT) environment of companies is presented. It says that cloud computing system provides cost benefits as compared with conventional systems to companies which cannot afford them. It discusses...

  • Data protection. SLOAN, MARTIN // Supply Management;Jun2013, Vol. 18 Issue 6, p16 

    The article discusses the case of insolvency of data centre operator 2e2 that has also violated its banking agreement and had reached its credit limits with suppliers. It focuses on the risk of data ransom for users of cloud computing and third-party hosting services. It also provides preventive...

  • Converging forces. DIX, JOHN // Network World;1/14/2013, Vol. 30 Issue 1, p3 

    In this article, the author discusses the developments in the services of information technology (IT) sector after the introduction of cloud computing services.

  • Cloudiness and reality. Gibbs, Mark // Network World;2/7/2011, Vol. 28 Issue 3, p38 

    The article discusses the nature of cloud computing, which is defined by the Information Technology Laboratory, as the model for enabling convenient network access to a shared pool of configurable computing resources that can be rapidly purveyed and released with minimal management effort.

  • Outlook Brightening for Data Security in the Cloud. Neff, Todd // Compliance Week;Jun2012, Vol. 9 Issue 101, p57 

    The article discusses the use of cloud computing in data security. It states that a mix of information technology (IT) self-awareness, new software offerings, and savvy dealings with providers of cloud computing could help in transitioning to cloud computing. It says that each type of cloud...

  • Summarizing the 2014 State of the Cloud. KOVALICK, AL // TV Technology;10/1/2014, Vol. 32 Issue 21, p26 

    The article discusses the key findings of a report which is a survey of technical professionals on cloud computing. Topics include levels of experience of the respondents, hybrid cloud implementation, and a table showing the change in Challenges like security and compliance with Cloud Maturity...

  • 2 MINUTES ON...Privacy: Who cares? Masters, Greg // SC Magazine: For IT Security Professionals (15476693);Apr2014, Vol. 25 Issue 4, p14 

    The article focuses on data security and privacy and the impact of data breach on companies and individuals. Topics include the exposure of personal data of more than 100 million customers of Neiman Marcus and Target, the awareness of citizens about possible exposure of personal information and...

  • Managing "Always-On" Employees with "Always-On" Security: Why Unified Device Management is Critical in a BYOD World. Choilawala, Murtuza // Security: Solutions for Enterprise Security Leaders;Nov2014, Vol. 51 Issue 11, p101 

    The article focuses on the management of security in mobile business through unified device management considering various factors including employee satisfaction, security compliance, and mobile integration cost. Topics discussed include several tips on how to manage an effective unified device...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics