{"id":6941,"date":"2013-04-12T08:30:00","date_gmt":"2013-04-12T08:30:00","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/blog-hub\/2013\/apr\/12\/cloud-security-from-hacking-the-mainframe-to-protecting-identity\/"},"modified":"2013-04-12T08:30:00","modified_gmt":"2013-04-12T08:30:00","slug":"cloud-security-from-hacking-the-mainframe-to-protecting-identity-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-security-from-hacking-the-mainframe-to-protecting-identity-2\/","title":{"rendered":"Cloud security: From hacking the mainframe to protecting identity"},"content":{"rendered":"<p>By Andi Mann, Vice President, Strategic Solutions at CA<\/p>\n<p>Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.<\/p>\n<p>To understand how recent trends are shifting security, let&rsquo;s revisit the golden age of hacking movies from the &lsquo;80s and &lsquo;90s. A recent post by Alexis Madrigal of <em>The Atlantic<\/em> sums up this era of Hollywood hackers by saying that &ldquo;the mainframe was unhackable unless [the hackers] were in the room, in which case, it was simple.&rdquo; <\/p>\n<p>That&rsquo;s not far off from how IT security was structured in those years. Enterprises secured data by keeping everything inside a corporate firewall and only granting accessed to employees within the perimeter. Typically, the perimeter extended as far &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Andi Mann, Vice President, Strategic Solutions at CA<br \/>\nCloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday live&#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-6941","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=6941"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6941\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=6941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=6941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=6941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}