Cloud, Mobile Technologies Expose Security Cracks

Eddy, Nathan
March 2014
eWeek;3/7/2014, p2
The article focuses on the study commissioned by identity access management (IAM) specialist SailPoint on the trends and concerns of organizations in IAM with information on the findings of the study. Among the findings include the difficulties faced by businesses to prove the effectiveness of their internal controls over user access privileges in an information technology (IT) audit, the use of cloud-based applications, and data protection through the use of IAM strategy.


Related Articles

  • Businesses Face Security Issues With Cloud Service Providers: Report.  // Channel Insider;6/6/2011, p1 

    The article reports on the security concern of businesses with regards to their cloud computing. According to the results of Trend Micro Inc.'s global cloud security survey, almost half of enterprise information technology (IT) decision-makers accounted a security issue or relapse with the cloud...

  • Take Advantage of Cloud in a Secure Way. Kaura, Tarun // PC Quest;Aug2015, p64 

    The article highlights trends and challenges relating to cloud computing security. Topics discussed include the emergence of data loss prevention technologies, the challenges of keeping corporate information safe and compliant, and the need for businesses to take a closer look at data governance...

  • Assessing cloud computing services.  // Automotive Body Repair News;Jul2011, Vol. 50 Issue 7, p66 

    The article offers tips on how businesses and industries could assess their cloud computing services. It advises businesses and industries to know where responsibility lies whenever customer information is missing. It also tells them to research processes of possible vendors, to come up with...

  • Safeguarding Documents. Landwehr, John // Internal Auditor;Apr2007, Vol. 64 Issue 2, p77 

    The article explains the importance of managing and securing information stored in an organization's enterprise systems. It mentions that the basic idea behind document-level security is that sensitive materials stay confidential and are managed in highly structured workflows at all times. It...

  • Cumulus effect. Doran, Ryan // Westchester County Business Journal;4/25/2011, Vol. 47 Issue 17, p17 

    The article reports on the impact of cloud computing on the business industry. The chief executive officer of Virtual Density, Christopher Furey notes that cloud computing makes a lot of sense to people who are dependent with information technology (IT) because the data stored in it is safe. It...

  • The new standard.  // Network World;6/20/2011, Vol. 28 Issue 12, p22 

    The author presents his views on the struggle of information technology (IT) organizations with data security on desktop virtualization. He mentions that organizations need to deploy technologies to help prevent data leakage and loss while allowing their workers to work anywhere using the device...

  • Time to make the move to the cloud; business is better up here. Blair, Forrest // Enterprise/Salt Lake City;12/8/2014, Vol. 44 Issue 17, p10 

    The article explores how businesses in Utah can benefit from cloud computing. Topics discussed include the evolution of cloud computing, the security of cloud-based information technology (IT) systems, and the easy use of software programs by companies and their employees via cloud-based...

  • Protecting identities. Sweeney Jr., Owen // American City & County;Mar2008, Vol. 123 Issue 3, p32 

    The article addresses the need for U.S. state legislatures to pass comprehensive data breach notification laws. Laws that require appropriate public notification after breaches occur can help prevent identity theft and minimize its harm by encouraging agencies to take proper security...

  • Don't Lose that Laptop, Don't Forget to Check that Address! Byrne, Niall // Accountancy Ireland;Oct2010, Vol. 42 Issue 5, p45 

    The article discusses the implementation of a personal data security breach Code of Practice by the Data Protection Commissioner (DPC) in Great Britain to regulate computer-related crimes. It states that the draft Code provides guidelines on the best practices in case of data security violations...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics