From the Fall 2014 Issue

Cloud Vulnerability – Scanning Options for Enterprises

Kellep A. Charles
Information Security Analyst/Researcher | SecurityOrb, LLC

  •  
  •  
  •  
  •  
  •  
  •  

Many enterprises wisely consider regular security vulnerability scans on information processing systems to be a vital component of their security programs. They allow the administrator to locate security weaknesses, assist in asset management and, most importantly, comply with regulatory compliance.

In a traditional environment, the process is not difficult to carry out, but with the introduction of cloud computing, the level of complexity for this process has increased. Therefore, before conducting a vulnerability scan involving cloud-based IT assets, it is important to ensure that proper security controls, processes, agreements and procedures are in place. That is what we will . . .

Leave a Comment