Cloud Computing - Maze in the Haze
When Amazon announced its EC2 environment in August 2006, one might not have imagined the change in trend this event would bring into the IT industry. With far more competitors to Amazon, one cannot help but admit to the fact that cloud computing will be a major catalyst for an evolution in the way the industry works. The cloud traverses international borders, taking our data with it and leaves us with a trail of concerns about data access, security and availability. After all these years, the question remains Are we ready to move our data to the clouds? This paper throws some light on certain differences in a few laws from India, USA and UK that indirectly or directly affect the way clouds work, what it entails to stay compliant and why it might be a good idea to invest in a team of security advisors fortified with a team of legal experts.
33819 (PDF, 2.01MB)
18 Oct 2011Related Content
Cloud Security Monitoring on AWS
Research PaperCloud services adoption is growing massively year over year. In most cases, moving to the cloud...
- 8 Feb 2021
Firebase: Google Cloud's Evil Twin
Research PaperFirebase allows a frontend application to connect directly to a backend database. Security wonks...
- 8 Oct 2020
- Brandon Evans
Compliance Benchmarks using Cloud Custodian
Research PaperWith the increased cloud adaption rate, many companies are looking for ready to use product...
- 25 Sep 2020
Top 5 Considerations for Multicloud Security
Research PaperThe move to leveraging multiple public cloud providers introduces new challenges and opportunities...
- 15 Apr 2020
- Brandon Evans
Cybersecurity in the Age of the Cloud
Research PaperThe hand-selected resources in this eBook provide a well-rounded look at cybersecurity...
- 21 Feb 2020
- Frank Kim
Secure Internet Gateways: Backing Down from a Fight
Research PaperWhen does a security agent become a double agent? On-premise corporate devices are protected by a...
- 2 Nov 2018
Intrusion detection through traffic analysis from the endpoint using Splunk Stream
Research PaperWith technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the...
- 24 May 2017
Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017
Research PaperAttackers are always changing their methods, but some cybersecurity trends are clear--and...
- 20 Mar 2017
Moving Legacy Software and FOSS to the Cloud, Securely
Research PaperAs more organizations consider the benefits of cloud adoption and use of legacy or freeand open...
- 28 Dec 2015
An Introduction To Securing a Cloud Environment
Research PaperWhile Cloud services offer flexibility, scalability and economies of scale, there have...
- 27 Nov 2012
Following Incidents into the Cloud
Research PaperThe increased level of complexity which cloud computing has introduced to incident handling is not...
- 1 Mar 2011
Step by Step Installation of a Secure Linux Web, DNS and Mail Server
Research PaperThis paper will show how the author configured a Linux based web and e-mail server for a small...
- 8 Apr 2004
The Art of Web Filtering
Research PaperWeb Filters are designed to improve the security and productivity of a network, but as with anything...
- 8 Apr 2004
Secure OS Environments for Linux
Research PaperIn this paper I make a review of the main set of tools and resources available for Linux system...
- 3 Jun 2003
The Consumer Desktop - The Weak Link in Internet Security and Why ISP's Are Uniquely Positio
Research PaperThe Internet community today is seeing a rapidly growing number of distributed denial-of-service...
- 11 Mar 2003
Norton AntiVirus C.E 7.6
Research PaperSince the Introduction of Norton Antivirus 7.x, Symantec have managed to created a truly remarkable...
- 10 Oct 2001
Security Strengths and Weaknesses of Two Popular Web Servers
Research PaperAs the mediator between your business and the world the Web Server that you choose must be...
- 19 Aug 2001
Using Snort v1.8 with SnortSnarf on a RedHat Linux System
Research PaperTo effectively implement system and network security, a multi pronged approach should be used....
- 25 Jul 2001
