An update on the highs, the lows and the cloudy areas of security challenges in a fast-evolving cloud environment. Yet, it is arguable that mass adoption of cloud services has returned information security professionals to the days of old when they would visit data centers with punch cards and magnetic tapes to implement programs and provide computing power, says Morey J Haber, vice-president of technology, office of the CTO, BeyondTrust. “Computers were not our own and were centralized. Today, the cloud is very similar, and the security challenges of the older data centers have not changed that much,” Haber adds.