The Treacherous 12 Cloud Computing Top Threats in 2016

At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standards, businesses are vulnerable to security breaches that can erase any gains made by the switch to cloud technology.

Hewlett Packard Enterprise and Intel® are the sponsors of this material. By submitting your information you agree to be contacted by Hewlett Packard Enterprise on topics of interest. Before deciding please review Hewlett Packard Enterprise’s privacy statement.




Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

Provided by: Hewlett-Packard Enterprise Topic: Cloud Date Added: May 2017 Format: PDF

Find By Topic