Cloud Security

34aa54ea9abbb1073d2ff4a687f72243

Utilize Your Current Directory in the Cloud

July 17, 2010 Added by:Lauren Twele

As enterprises shift some of their data and applications to the cloud they are caught between managing identities locally at the network level, and providing access to their users to applications in the cloud...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Data Vulnerabilities in the Cloud

July 16, 2010 Added by:Danny Lieberman

Since almost all data breaches occur on the interface – adding an additional technology layer will serve to increase your value at risk not reduce it – since more complexity and more third party software only adds additional vulnerabilities and increases your threat surface...

Comments  (0)

46d045ff5190f6ea93739da6c0aa19bc

Security Solutions for Cloud Computing

July 15, 2010 Added by:Wolf Halton

This paper is concerned with discovery of the vulnerabilities in the landscape of the cloud, about discovery of security solutions, and about finding evidence that early-adopters or developers have grown more concerned with security...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Top 10 Security Concerns for Cloud Computing

July 13, 2010 Added by:Global Knowledge

The cost of dealing with this amount of data is something that companies must address. In today's economy, companies are looking at any cost-saving measures, and the bottom line is that cloud computing provides much greater flexibility than previous computing models...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Cloud Computing and Your Enterprise

July 07, 2010 Added by:Brent Huston

Organizations must embrace policies and processes to cover these technologies and their issues. They also have to embrace education and awareness training around these topics with their user base...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Convergence, Or a Quasi Suite?

July 06, 2010 Added by:Ben Kepes

Jacob Morgan posted, asking whether or not we’re going to see vendor convergence in the Enterprise 2.0 space, while his particular focus was the rapidly burgeoning number of offerings in the space, I think part of what he was talking about is relevant to the suite vs best of breed debate...

Comments  (0)

E973b16363b3de77b360563237df7e32

Cloud Computing Data Protection World Map

June 25, 2010 Added by:Bozidar Spirovski

Security and privacy in cloud computing are hot topics, and everyone has a take on it. Cloud computing providers deliver their levels of security and privacy by their internal policies and procedures, but the rigidity of these policies are strongly influenced by government regulations.

Comments  (1)

34aa54ea9abbb1073d2ff4a687f72243

Does SaaS Diminish the Need for Enterprise Architecture?

June 22, 2010 Added by:Lauren Twele

This is a good question, but we have to understand what is meant by Enterprise Architecture (EA). It is generally accepted to be a discipline and sometimes a role or organization responsible for those activities that strategically align an organization to its technology and business goals.

Comments  (0)

6d117b57d55f63febe392e40a478011f

PineApp CEO Hezi Erez: Recession Threatens Security

June 08, 2010 Added by:Anthony M. Freed

I recently had the opportunity to discuss enterprise security issues with Hezi Erez, CEO at PineApp, a leading security solution provider for Information Technology. Mr. Erez is a 1986 graduate of the Technion, the Israel Institute of Technology, and he specializes in telecommunication, microelectronics, computers and optics, and Mr. Erez has 20 years of extensive experience as an executive in Hi-...

Comments  (0)

34aa54ea9abbb1073d2ff4a687f72243

Taking Control of the Cloud

June 05, 2010 Added by:Lauren Twele

One of the key issues in today’s highly inter-connected computing model, especially regarding Cloud Computing, is Control. In the old days, if I needed access control, I pulled together the Ops teams that managed applications to execute a plan for installing plug-ins that can both authenticate and authorize web accesses.

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Cloud Computing – It’s not ‘WHAT’ but ‘HOW’ we do things…

June 03, 2010 Added by:K S Abhiraj

The concept of cloud itself is one of those things that certainly get lot of hype, but no matter how one looks at it, the fact remains that it’s been used on greater and greater numbers and is becoming a more important topic for people to understand and with that certainty, the security aspect of it also playing an important role. Including what does that means and how do people deal w...

Comments  (0)

34aa54ea9abbb1073d2ff4a687f72243

Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)

F520f65cba281c31e29c857faa651872

Infrastructure will Determine Future of Cloud Computing

May 21, 2010 Added by:Rahul Neel Mani

Rolf Kleinwächter, Head of Managed Office and Infrastructure-as-a-Service, Fujitsu, agrees that it is still the early days of cloud computing, but says his company is prepared to cash in on the new developments...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Security Compliance in a Cloud

April 19, 2010 Added by:Mark Gardner

For this inaugural post I have decided to tackle, what I perceive to be one of the biggest conundrums within the growth area of Cloud Computing, Security Compliance. I use the term conundrum, not that I believe for one second that Cloud Computing does not need Security and some form of compliance, far from it, but that suddenly these seem to have become show stopping issues for the uptake...

Comments  (6)

65be44ae7088566069cc3bef454174a7

Privacy and Cloud Computing Challenges

April 16, 2010 Added by:Rebecca Herold

The concept of “cloud computing” is not well known by most folks. Certainly not the personnel using a vast and growing number of cloud computing applications, without even know it, from business networks. If they don’t know what they are using, then how can they know the information security and privacy risks involved?

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »