?
?The threat environment we?re seeing today is radically different from what existed just six months ago. Six months from now, I expect to say the same thing. The actors behind the threats are evolving; the |motivation behind attacks is more difficult to predict and anticipate. So what we stress with our customers is that it?s not enough to have a security strategy in place today; it?s about deploying a long-term security solution that has the flexibility and scalability to adapt to this ever-evolving threat environment.?
- Andy Ellis, Akamai Chief Security Officer
As the world becomes increasingly hyperconnected, the opportunities for innovation and new
business models are virtually limitless. Internet technology, and especially the virtualization and
distributed processing power brought to life through cloud computing, have freed businesses to
explore new business opportunities that simply weren?t possible to consider just a few years ago.
At the same time, however, the complexity and risk associated with those opportunities is great. With so much business-critical information at stake, the need to protect those assets is more important than ever before. The motivations of web-based security threats vary significantly. Known and emerging hacking groups, political protest movements, even governments are among the sources of attacks executed on a global scale, on a daily basis. The goals of these various factions can include:
?Embarrassing and shaming their targets
? Exposing or stealing intellectual property and trade secrets
? Harvesting sensitive data and personally identifiable information (PII)
? Disrupting critical business processes
? Diminishing political stability or furthering a particular political agenda
Clearly, these threats have the potential for enormous ramifications. But so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. So is it possible to have a ?No Compromises? security strategy that scales to protect against known and emerging threats while actually providing more freedom to conduct business online, and innovate without the constant fear of attack? We believe so.
To read more Click Here to download report with your linkedin credentials.
?
This entry was posted in Cloud Computing, Cloud Security, Free Resources, Free Whitepapers-Ebooks and tagged Akamai Technologies, Business, Chief security officer, Cloud computing, Distributed computing, Information security, Personally identifiable information, Protest. Bookmark the permalink.Source: http://clean-clouds.com/2012/08/23/evolving-web-threats-demand-new-approaches-to-security-for-the-healthcare-and-life-sciences-industries/
slither
cowboys vs giants ndaa timberwolves weight watchers rawhide bigfoot sandra dee
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.