{"id":16482,"date":"2015-08-06T20:33:00","date_gmt":"2015-08-06T20:33:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3348325"},"modified":"2015-08-06T20:33:00","modified_gmt":"2015-08-06T20:33:00","slug":"treat-security-as-a-process-not-an-event-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/treat-security-as-a-process-not-an-event-cloudexpo-cloud\/","title":{"rendered":"Treat Security as a Process Not an Event | @CloudExpo #Cloud"},"content":{"rendered":"<p>As a class of business, IT providers may be hip to risk as a matter of course, but they aren\u2019t exempt from the rules of the game and, given their special position in the information security ecosystem, attacks directed their way can be enormously consequential.<br \/>\nHacking doesn&#8217;t happen only to other people.<br \/>\nWhile last spring&#8217;s notorious Sony hack may have implied that the biggest targets are the most vulnerable, any organization can be a victim &#8211; and, perhaps surprisingly, an unwitting perpetrator.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3348325\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a class of business, IT providers may be hip to risk as a matter of course, but they aren&rsquo;t exempt from the rules of the game and, given their special position in the information security ecosystem, attacks directed their way can be enormously consequential.<br \/>\nHacking doesn&#8217;t happen only to other people.<br \/>\nWhile last spring&#8217;s notorious Sony hack may have implied that the biggest targets are the most vulnerable, any organization can be a victim &#8211; and, perhaps surprisingly, an unwitting perpetrator.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3348325\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-16482","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=16482"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16482\/revisions"}],"predecessor-version":[{"id":16648,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16482\/revisions\/16648"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=16482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=16482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=16482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}