3 Problems Cloud Security Certification Can Solve

What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers?

The basic promise of cloud computing is undeniably appealing: Increase efficiency and reduce cost by taking advantage of flexibly pooled computing resources managed by somebody else.

Indeed, as Bill Brenner of CSO put it, “Given how expensive it is to maintain in-house hardware and software, the idea of putting one’s IT infrastructure in the cloud sounds downright heavenly.”

Unfortunately, this “heavenly” scenario is marred by real concerns about security – concerns which can range from network security basics like data integrity and identity management to abstruse questions of “local law and jurisdiction where data is held.”

Yes, cloud computing is changing everything from data center architecture to entire business eco-systems. However, as a new paradigm the many complex questions it poses, particularly when it comes to issues of security, governance, and compliance, are effectively preventing (or at least slowing) its widespread adoption.

So how would a Cloud Security Certification, such as that being proposed by the Cloud Security Alliance (CSA) help matters? Continue reading.

Related Posts

New Security Threat Against ‘Smart Phone’ Users Computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart ...
Blue Skies Thinking for Cloud Security? As cloud computing moves data and services from local systems to remote centres, the question of security for organisations must be addressed. A resea...
Mozilla Debates Whether to Trust Chinese CA Sometimes geeky technical details matter only to engineers. But sometimes a seemingly arcane technical decision exposes deep social or political divis...
A Comfortable and Secure Login Method As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one's different online accounts. Dr. ...
How to Stop Distant Attacks on RFID Chips The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this pr...
Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You A British computer hacker equipped with a "Dummies" guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and n...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *