Cloud Computing

Last Updated on 3 April 2013, Total: 19 Articles and Tutorials

  1. An Inside look at avoiding cloud risks

    In this article the author will cover recent events that have exposed millions of users due to lack of planning and contingency... Read More

  2. Cloud Backup, is it ready?

    In this article the author discusses why organizations move to the cloud and what security measures are required for safe cloud computing... Read More

  3. Best practice for using cloud computing in Europe 2013 (Part 2)

    This article (part two) will focus on the final three principles of good information handling. These principles will cover the obligations on organisations for processing and storing data... Read More

  4. Best practice for using cloud computing in Europe 2013 (Part 1)

    This article (part one) will focus on the first four principles of good information handling... Read More

  5. Key Cloud Privacy Concerns in 2012

    This article covers major concerns that companies have when data is stored and processed in the cloud, and things that can be done to better protect against the threat vector... Read More

  6. Malwares impact, serious and long lasting

    In this article, the author will focus on malware like Flame and others, and measures that can be taken to counter these threats... Read More

  7. Security Considerations for Cloud Computing (Part 6) - Metered Services

    This article looks at the final essential characteristic of cloud computing: metered services... Read More

  8. Security Considerations for Cloud Computing (Part 5) - Rapid Elasticity

    In this part of the series, we’ll turn our attention to another essential characteristic of cloud computing: rapid elasticity... Read More

  9. Security Considerations for Cloud Computing (Part 4) - Resource Pooling

    In this article, we will continue with the theme and pick up on the third essential characteristic of cloud computing: pooled resources... Read More

  10. Security Considerations for Cloud Computing (Part 3) - Broad Network Access

    In this, part 3 of our series, we’ll discuss how the “Broad Network Access” characteristic of cloud computing introduces security issues that you need to address... Read More

Featured Links