{"id":440326,"date":"2010-03-17T16:57:00","date_gmt":"2010-03-17T20:57:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-803515719188109262"},"modified":"2010-03-17T16:57:00","modified_gmt":"2010-03-17T20:57:00","slug":"management-reaction-to-failed-cloud-security","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/440326","title":{"rendered":"Management Reaction to Failed Cloud Security"},"content":{"rendered":"<p>After all the risk assessments, cost analysis and decisions, you decide to send your data into the cloud. And things are good &#8211; at least until the security breach.<\/p>\n<p>When that happens, every security professional and IT management will get grilled by top management. Youtube has a mockup video that just might give you the feeling of how this will look like.<\/p>\n<p>Ofcourse, a video of Hitler reacting to a hacked cloud computing service is a bit of an overkill. But be sure that you&#8217;ll hear a lot of the sentences that are mocked up, even if not in that tone.<\/p>\n<p>You can see the video here<br \/><object height=\"385\" width=\"480\"><param name=\"movie\" value=\"http:\/\/www.youtube.com\/v\/VjfaCoA2sQk&amp;hl=en_US&amp;fs=1&amp;\"><param name=\"allowFullScreen\" value=\"true\"><param name=\"allowscriptaccess\" value=\"always\"><embed src=\"http:\/\/www.youtube.com\/v\/VjfaCoA2sQk&amp;hl=en_US&amp;fs=1&amp;\" type=\"application\/x-shockwave-flash\" allowscriptaccess=\"always\" allowfullscreen=\"true\" height=\"385\" width=\"480\"><\/embed><\/object><\/p>\n<p>Talkback and comments are most welcome<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2009\/01\/security-concerns-cloud-cloud-computing.html\">Security Concerns Cloud \u201cCloud Computing\u201d<\/a>< <a href=\"http:\/\/www.shortinfosec.net\/2009\/11\/how-to-trust-cloud-computing.html\">How to Trust Cloud Computing<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/08\/cloud-computing-premature-murder-of.html\">Cloud Computing &#8211; Premature murder of the datacenter<\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-803515719188109262?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/-iofkHMMHfA\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After all the risk assessments, cost analysis and decisions, you decide to send your data into the cloud. And things are good &#8211; at least until the security breach. When that happens, every security professional and IT management will get grilled by top management. Youtube has a mockup video that just might give you the [&hellip;]<\/p>\n","protected":false},"author":5679,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-440326","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/440326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/5679"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=440326"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/440326\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=440326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=440326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=440326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}