background preloader

IT Security

Facebook Twitter

Gartner: Seven cloud-computing security risks. Cloud computing is fraught with security risks, according to analyst firm Gartner.

Gartner: Seven cloud-computing security risks

Smart customers will ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor, Gartner says in a June report titled "Assessing the Security Risks of Cloud Computing. " Cloud computing has "unique attributes that require risk assessment in areas such as data integrity, recovery, and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance, and auditing," Gartner says.

(Compare security products.) Amazon's EC2 service and Google's Google App Engine are examples of cloud computing, which Gartner defines as a type of computing in which "massively scalable IT-enabled capabilities are delivered 'as a service' to external customers using Internet technologies. " [ Learn more about what cloud computing really means and the new breed of utility computing and platform-as-a-service offerings. ] 1. 2. 3. Singapore steps up hosted security services patronage.

91% of Singaporean companies believe IT security as issue as 33% rated attacks as effective.

Singapore steps up hosted security services patronage

Seventy-five percent of Asia Pacific organisations experienced cyber-attacks in the past 12 months, costing enterprise businesses an average of US$763,000 per year. 33 percent of Singapore enterprises rated the attacks somewhat or highly effective, according to the recent Symantec 2010 State of Enterprise Security Survey. Now Symantec Hosted Services has conducted a further survey to determine what companies in Singapore are doing about the threat. The findings indicate that the level of trust in Security as a Service – what is coming to be known as cloud security – as a potential solution to the relentless spam and malware onslaught is at an all-time high. The research was carried out by the market research firm Harris Interactive which conducted interviews with 104 IT Managers and IT decision makers in Singapore in 2010. Study Highlights: "This study confirms our predictions. Identity management top security priority in Gartner survey. Network World - Identity management projects are getting the top attention in enterprises in terms of security spending priorities, according to Gartner, which will be taking up the subject at its annual Gartner Security & Risk Management Summit 2010 conference later this month.

Identity management top security priority in Gartner survey

IT professionals at 308 companies participated in the survey. Gartner conducts the survey annually to assess trends, and this year it appears that projects that may have been put on the backburner because of the recession are now being put into action. While identity management ranks first in the top five priorities for security, the balance in the list includes data-loss prevention, anti-virus, firewalls and intrusion prevention. Gartner research director Vic Wheatman acknowledges he finds it "odd" that anti-virus, long established in the enterprise, would continue to be ranked in the Top Five list so highly in terms of IT security projects. Gartner: The cloud and security are biggest trends for 2010. At the Gartner Symposium/ITxpo in Orlando, analysts noted trends that they believe will have the greatest impact on the enterprise in 2010 and beyond. The first item on Gartner’s list is cloud computing. Gartner research figures say that IT spending in 2010 will total US$3.3 trillion, a 3.3% increase from 2009, and one of the key trends accelerating this expected growth will be a shift to cloud computing.

Security was pointed out as another notable technology in 2010, as Gartner says information security professionals face the challenge of detecting malicious activity among discrete events that are usually associated with an authorized user, and are generated from multiple network, system and application sources. Additionally, security departments are facing increasing demands for log analysis and reporting on audit requirements. Gartner predicts that by the year 2010, 1.2 billion people will carry handheld devices that have Internet capabilities.