Securing the keys to the cloud

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

As the cloud model is put to the test at more organizations, security holes and malware are coming to light. Here's how to cope.

Business networking site LinkedIn suffered a security breach in June that resulted in the theft of more than 6 million user account passwords, which were subsequently published online. Although the company says there were no reports of compromised accounts, the incident garnered headlines about the risks of the cloud.

And in April 2011, a server breach at email marketing company Epsilon Interactive exposed the names and email addresses of millions of people. The company said unknown intruders broke into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers.

As these incidents show, the cloud is still very much a work in progress when it comes to security. Although many cloud service providers claim they can secure their customers' data, security problems are surfacing as the technology takes hold at more organizations.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Editors' Picks
Join the discussion
Be the first to comment on this article. Our Commenting Policies