Cloud Security

4c1c5119b03285e3f64bd83a8f9dfeec

Convergence, Or a Quasi Suite?

July 06, 2010 Added by:Ben Kepes

Jacob Morgan posted, asking whether or not we’re going to see vendor convergence in the Enterprise 2.0 space, while his particular focus was the rapidly burgeoning number of offerings in the space, I think part of what he was talking about is relevant to the suite vs best of breed debate...

Comments  (0)

E973b16363b3de77b360563237df7e32

Cloud Computing Data Protection World Map

June 25, 2010 Added by:Bozidar Spirovski

Security and privacy in cloud computing are hot topics, and everyone has a take on it. Cloud computing providers deliver their levels of security and privacy by their internal policies and procedures, but the rigidity of these policies are strongly influenced by government regulations.

Comments  (1)

34aa54ea9abbb1073d2ff4a687f72243

Does SaaS Diminish the Need for Enterprise Architecture?

June 22, 2010 Added by:Lauren Twele

This is a good question, but we have to understand what is meant by Enterprise Architecture (EA). It is generally accepted to be a discipline and sometimes a role or organization responsible for those activities that strategically align an organization to its technology and business goals.

Comments  (0)

6d117b57d55f63febe392e40a478011f

PineApp CEO Hezi Erez: Recession Threatens Security

June 08, 2010 Added by:Anthony M. Freed

I recently had the opportunity to discuss enterprise security issues with Hezi Erez, CEO at PineApp, a leading security solution provider for Information Technology. Mr. Erez is a 1986 graduate of the Technion, the Israel Institute of Technology, and he specializes in telecommunication, microelectronics, computers and optics, and Mr. Erez has 20 years of extensive experience as an executive in Hi-...

Comments  (0)

34aa54ea9abbb1073d2ff4a687f72243

Taking Control of the Cloud

June 05, 2010 Added by:Lauren Twele

One of the key issues in today’s highly inter-connected computing model, especially regarding Cloud Computing, is Control. In the old days, if I needed access control, I pulled together the Ops teams that managed applications to execute a plan for installing plug-ins that can both authenticate and authorize web accesses.

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Cloud Computing – It’s not ‘WHAT’ but ‘HOW’ we do things…

June 03, 2010 Added by:K S Abhiraj

The concept of cloud itself is one of those things that certainly get lot of hype, but no matter how one looks at it, the fact remains that it’s been used on greater and greater numbers and is becoming a more important topic for people to understand and with that certainty, the security aspect of it also playing an important role. Including what does that means and how do people deal w...

Comments  (0)

34aa54ea9abbb1073d2ff4a687f72243

Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)

F520f65cba281c31e29c857faa651872

Infrastructure will Determine Future of Cloud Computing

May 21, 2010 Added by:Rahul Neel Mani

Rolf Kleinwächter, Head of Managed Office and Infrastructure-as-a-Service, Fujitsu, agrees that it is still the early days of cloud computing, but says his company is prepared to cash in on the new developments...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Security Compliance in a Cloud

April 19, 2010 Added by:Mark Gardner

For this inaugural post I have decided to tackle, what I perceive to be one of the biggest conundrums within the growth area of Cloud Computing, Security Compliance. I use the term conundrum, not that I believe for one second that Cloud Computing does not need Security and some form of compliance, far from it, but that suddenly these seem to have become show stopping issues for the uptake...

Comments  (6)

65be44ae7088566069cc3bef454174a7

Privacy and Cloud Computing Challenges

April 16, 2010 Added by:Rebecca Herold

The concept of “cloud computing” is not well known by most folks. Certainly not the personnel using a vast and growing number of cloud computing applications, without even know it, from business networks. If they don’t know what they are using, then how can they know the information security and privacy risks involved?

Comments  (0)

F520f65cba281c31e29c857faa651872

Chris Powers: HP's Worldwide Director of Enterprise Storage

April 13, 2010 Added by:Rahul Neel Mani

Chris Powers, Worldwide Director, Enterprise Storage, HP StorageWorks Division spoke to Rahul Neel Mani about HP’s latest push – ‘Storage and Server Convergence’ – as well as other technologies that will excite enterprise users in 2010-11.

Comments  (0)

924ce315203c17e05d9e04b59648a942

2010: A Year of Change for the Security Industry

April 04, 2010 Added by:Richard Stiennon

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is Security a Curse for the Cloud Computing Industry?

March 25, 2010 Added by:Richard Stiennon

In 1975 my father, a doctor, was approached by some entrepreneurs. They had a brilliant idea. They were going to purchase a mainframe computer and sell computing on a timeshare basis to anyone who wanted to connect to it.  Charges would be based on compute cycles and applications would be provided pre-loaded.  Sound familiar?  That was cloud computing.   Today’s clou...

Comments  (3)

B59a51a3c0bf9c5228fde841714f523a

How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Cloud computing: A Maneuvered Phrase !

February 11, 2010 Added by:K S Abhiraj

Cloud computing has become a huge ‘buzz-phrase’ in last few years, but you’d be forgiven for not knowing what the term actually means indeed. Different people interpret “cloud computing” in different ways. That’s the dilemma because computing “in the cloud” may be important for you and your organization, but if it’s not clear what it actually m...

Comments  (2)

Page « < 21 - 22 - 23 - 24 - 25 > »
Most Liked