{"id":9258,"date":"2013-10-22T17:09:00","date_gmt":"2013-10-22T17:09:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2844184"},"modified":"2013-10-22T17:09:00","modified_gmt":"2013-10-22T17:09:00","slug":"from-the-stone-age-to-today-history-of-security-infographic","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/from-the-stone-age-to-today-history-of-security-infographic\/","title":{"rendered":"From the Stone Age to Today \u2013 History of Security Infographic"},"content":{"rendered":"<p>When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches.<br \/>\nOf course I think of the cloud when discussing security. In the contemporary world of information security, enterprises and institutions are increasingly acknowledging the need to find new ways to protect their most sensitive information when using cloud applications.<br \/>\nGiven the speed of advancements in the technology world, enterprises need to be constantly changing, adapting and improving security. From the beginning of history the issue of security has been a key priority.<br \/>\nLet\u2019s see what we can learn from those that came ahead of us in this PerspecSys\u2019 infographic that takes a fun walk through the past \u2013 The History of Security.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2844184\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches.<br \/>\nOf course I think of the cloud when discussing security. In the contemporary world of information security, enterprises and institutions are increasingly acknowledging the need to find new ways to protect their most sensitive information when using cloud applications.<br \/>\nGiven the speed of advancements in the technology world, enterprises need to be constantly changing, adapting and improving security. From the beginning of history the issue of security has been a key priority.<br \/>\nLet&rsquo;s see what we can learn from those that came ahead of us in this PerspecSys&rsquo; infographic that takes a fun walk through the past &ndash; The History of Security.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2844184\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-9258","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=9258"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9258\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=9258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=9258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=9258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}