Global insurer Chartis targets the cyber insurance policy at MNCs in Hong Kong, Singapore, Australia and New Zealand with a minimum annual turnover of US$100,000. Limits of liability are capped at US$10 million, subject to individual risk assessment.
by: Asia Cloud Forum editors 14-May-2012
The absence of specific regulatory guidance is one reason why banking and financial institutions are slower cloud adopters. There is also a lack of auditing standards that provide direction and guidance for proper cloud implementation with appropriate security and privacy measures.
by: Carol Ko 08-May-2012
While the major inherent cloud computing risks on access security, data confidentiality, legal and regulatory compliance are typically addressed, some other risks remain less visible to the community.
by: Carol Ko 08-May-2012
What does it take to educate young people in the digital era? Understandably, schools, governments and policymakers are in a quandary on how to choose from a slew of technology options available the best fit for an institution's learning objectives.
by: Eden Estopace, eGov Innovation 04-May-2012
Even as trust marks for cloud services are being established, companies using such services need to ask their providers critical questions about where their data is stored, who has access to it and whether it’s stored on shared servers.
by: Khoo Boo Leong 01-May-2012
As the cloud outsourcing industry continues to mature, businesses are becoming aware of the impact that bad security can have on their business. Steve Durbin, global VP of the Information Security Forum suggests 3 keys to minimizing risks.
by: Khoo Boo Leong 26-Apr-2012
Aiming to help companies manage the challenges faced when adopting cloud computing, ISACA's newly issued "Guiding Principles for Cloud Computing Adoption and Use" cover enablement, cost and benefit, enterprise risk, capability, accountability, and trust.
by: Asia Cloud Forum editors 28-Feb-2012
No one is certain of all the legal risks associated with enterprises storing confidential or proprietary information outside the corporate firewall -- in the cloud. However, there is growing consensus about what companies should ask cloud vendors to maintain a secure IT environment and avoid potential legal risks associated with the cloud.
by: Colin J. Zick, partner, Foley Hoag LLP and contributor, SearchCloudComputing.com 12-Jan-2012
The "vulnerable points" in a cloud computing environment may not be so much in the cloud itself, but the mobile devices and end points used to access data via the Internet. Part II of this Websense interview examines how DLP can help secure classified data in the cloud in five industries.
by: Carol Ko 22-Dec-2011
In the cloud computing era when data can be processed and stored anywhere in the "good" hands of the cloud service providers, why should business still care about data loss prevention? How can IT practitioners achieve the best synergy between DLP and cloud computing?
by: Carol Ko 20-Dec-2011