Cloud Security


Utilize Your Current Directory in the Cloud

July 17, 2010 Added by:Lauren Twele

As enterprises shift some of their data and applications to the cloud they are caught between managing identities locally at the network level, and providing access to their users to applications in the cloud...

Comments  (0)


Data Vulnerabilities in the Cloud

July 16, 2010 Added by:Danny Lieberman

Since almost all data breaches occur on the interface – adding an additional technology layer will serve to increase your value at risk not reduce it – since more complexity and more third party software only adds additional vulnerabilities and increases your threat surface...

Comments  (0)


Security Solutions for Cloud Computing

July 15, 2010 Added by:Wolf Halton

This paper is concerned with discovery of the vulnerabilities in the landscape of the cloud, about discovery of security solutions, and about finding evidence that early-adopters or developers have grown more concerned with security...

Comments  (0)


Top 10 Security Concerns for Cloud Computing

July 13, 2010 Added by:Global Knowledge

The cost of dealing with this amount of data is something that companies must address. In today's economy, companies are looking at any cost-saving measures, and the bottom line is that cloud computing provides much greater flexibility than previous computing models...

Comments  (0)


Cloud Computing and Your Enterprise

July 07, 2010 Added by:Brent Huston

Organizations must embrace policies and processes to cover these technologies and their issues. They also have to embrace education and awareness training around these topics with their user base...

Comments  (0)


Convergence, Or a Quasi Suite?

July 06, 2010 Added by:Ben Kepes

Jacob Morgan posted, asking whether or not we’re going to see vendor convergence in the Enterprise 2.0 space, while his particular focus was the rapidly burgeoning number of offerings in the space, I think part of what he was talking about is relevant to the suite vs best of breed debate...

Comments  (0)


Cloud Computing Data Protection World Map

June 25, 2010 Added by:Bozidar Spirovski

Security and privacy in cloud computing are hot topics, and everyone has a take on it. Cloud computing providers deliver their levels of security and privacy by their internal policies and procedures, but the rigidity of these policies are strongly influenced by government regulations.

Comments  (1)


Does SaaS Diminish the Need for Enterprise Architecture?

June 22, 2010 Added by:Lauren Twele

This is a good question, but we have to understand what is meant by Enterprise Architecture (EA). It is generally accepted to be a discipline and sometimes a role or organization responsible for those activities that strategically align an organization to its technology and business goals.

Comments  (0)


PineApp CEO Hezi Erez: Recession Threatens Security

June 08, 2010 Added by:Anthony M. Freed

I recently had the opportunity to discuss enterprise security issues with Hezi Erez, CEO at PineApp, a leading security solution provider for Information Technology. Mr. Erez is a 1986 graduate of the Technion, the Israel Institute of Technology, and he specializes in telecommunication, microelectronics, computers and optics, and Mr. Erez has 20 years of extensive experience as an executive in Hi-...

Comments  (0)


Taking Control of the Cloud

June 05, 2010 Added by:Lauren Twele

One of the key issues in today’s highly inter-connected computing model, especially regarding Cloud Computing, is Control. In the old days, if I needed access control, I pulled together the Ops teams that managed applications to execute a plan for installing plug-ins that can both authenticate and authorize web accesses.

Comments  (0)


Cloud Computing – It’s not ‘WHAT’ but ‘HOW’ we do things…

June 03, 2010 Added by:K S Abhiraj

The concept of cloud itself is one of those things that certainly get lot of hype, but no matter how one looks at it, the fact remains that it’s been used on greater and greater numbers and is becoming a more important topic for people to understand and with that certainty, the security aspect of it also playing an important role. Including what does that means and how do people deal w...

Comments  (0)


Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)


Infrastructure will Determine Future of Cloud Computing

May 21, 2010 Added by:Rahul Neel Mani

Rolf Kleinwächter, Head of Managed Office and Infrastructure-as-a-Service, Fujitsu, agrees that it is still the early days of cloud computing, but says his company is prepared to cash in on the new developments...

Comments  (1)


Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)


Security Compliance in a Cloud

April 19, 2010 Added by:Mark Gardner

For this inaugural post I have decided to tackle, what I perceive to be one of the biggest conundrums within the growth area of Cloud Computing, Security Compliance. I use the term conundrum, not that I believe for one second that Cloud Computing does not need Security and some form of compliance, far from it, but that suddenly these seem to have become show stopping issues for the uptake...

Comments  (6)


Privacy and Cloud Computing Challenges

April 16, 2010 Added by:Rebecca Herold

The concept of “cloud computing” is not well known by most folks. Certainly not the personnel using a vast and growing number of cloud computing applications, without even know it, from business networks. If they don’t know what they are using, then how can they know the information security and privacy risks involved?

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »