Cloud Security


NGA Explores Community Cloud with NCOIC

July 19, 2010 Added by:Kevin L. Jackson

Their immediate interest is in developing an open standards based community cloud that would support the 26 NATO, 10 partner and 2 non-NATO/non-partner countries...

Comments  (0)


Azure Launches Cloud in a Box

July 19, 2010 Added by:Ben Kepes

The ideas of this is to create a Windows Azure platform appliance that will form a turnkey cloud platform available for enterprises to enable them to set up their own PaaS clouds within their organizations...

Comments  (0)


Utilize Your Current Directory in the Cloud

July 17, 2010 Added by:Lauren Twele

As enterprises shift some of their data and applications to the cloud they are caught between managing identities locally at the network level, and providing access to their users to applications in the cloud...

Comments  (0)


Data Vulnerabilities in the Cloud

July 16, 2010 Added by:Danny Lieberman

Since almost all data breaches occur on the interface – adding an additional technology layer will serve to increase your value at risk not reduce it – since more complexity and more third party software only adds additional vulnerabilities and increases your threat surface...

Comments  (0)


Security Solutions for Cloud Computing

July 15, 2010 Added by:Wolf Halton

This paper is concerned with discovery of the vulnerabilities in the landscape of the cloud, about discovery of security solutions, and about finding evidence that early-adopters or developers have grown more concerned with security...

Comments  (0)


Top 10 Security Concerns for Cloud Computing

July 13, 2010 Added by:Global Knowledge

The cost of dealing with this amount of data is something that companies must address. In today's economy, companies are looking at any cost-saving measures, and the bottom line is that cloud computing provides much greater flexibility than previous computing models...

Comments  (0)


Cloud Computing and Your Enterprise

July 07, 2010 Added by:Brent Huston

Organizations must embrace policies and processes to cover these technologies and their issues. They also have to embrace education and awareness training around these topics with their user base...

Comments  (0)


Convergence, Or a Quasi Suite?

July 06, 2010 Added by:Ben Kepes

Jacob Morgan posted, asking whether or not we’re going to see vendor convergence in the Enterprise 2.0 space, while his particular focus was the rapidly burgeoning number of offerings in the space, I think part of what he was talking about is relevant to the suite vs best of breed debate...

Comments  (0)


Cloud Computing Data Protection World Map

June 25, 2010 Added by:Bozidar Spirovski

Security and privacy in cloud computing are hot topics, and everyone has a take on it. Cloud computing providers deliver their levels of security and privacy by their internal policies and procedures, but the rigidity of these policies are strongly influenced by government regulations.

Comments  (1)


Does SaaS Diminish the Need for Enterprise Architecture?

June 22, 2010 Added by:Lauren Twele

This is a good question, but we have to understand what is meant by Enterprise Architecture (EA). It is generally accepted to be a discipline and sometimes a role or organization responsible for those activities that strategically align an organization to its technology and business goals.

Comments  (0)


PineApp CEO Hezi Erez: Recession Threatens Security

June 08, 2010 Added by:Anthony M. Freed

I recently had the opportunity to discuss enterprise security issues with Hezi Erez, CEO at PineApp, a leading security solution provider for Information Technology. Mr. Erez is a 1986 graduate of the Technion, the Israel Institute of Technology, and he specializes in telecommunication, microelectronics, computers and optics, and Mr. Erez has 20 years of extensive experience as an executive in Hi-...

Comments  (0)


Taking Control of the Cloud

June 05, 2010 Added by:Lauren Twele

One of the key issues in today’s highly inter-connected computing model, especially regarding Cloud Computing, is Control. In the old days, if I needed access control, I pulled together the Ops teams that managed applications to execute a plan for installing plug-ins that can both authenticate and authorize web accesses.

Comments  (0)


Cloud Computing – It’s not ‘WHAT’ but ‘HOW’ we do things…

June 03, 2010 Added by:K S Abhiraj

The concept of cloud itself is one of those things that certainly get lot of hype, but no matter how one looks at it, the fact remains that it’s been used on greater and greater numbers and is becoming a more important topic for people to understand and with that certainty, the security aspect of it also playing an important role. Including what does that means and how do people deal w...

Comments  (0)


Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)


Infrastructure will Determine Future of Cloud Computing

May 21, 2010 Added by:Rahul Neel Mani

Rolf Kleinwächter, Head of Managed Office and Infrastructure-as-a-Service, Fujitsu, agrees that it is still the early days of cloud computing, but says his company is prepared to cash in on the new developments...

Comments  (1)


Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)

Page « < 22 - 23 - 24 - 25 - 26 > »