Printer Friendly

Browse Cloud computing topic

Safety and security measures subtopic

Articles

1-300 out of 308 article(s) nextnext page
Title Author Type Date Words
2019 Innovations in Quantum-proof, AI-, BDA- and Cloud-based Security. Jan 16, 2020 376
European Cloud Security Project Provides Tools for the Development of Cybersecurity in the EU. Dec 31, 2019 579
Cloud Access Security Broker Market: Development Trends, Worldwide Growth, Global Industry Analysis, Opportunity Assessment, by Current & Upcoming Trends. Dec 30, 2019 942
Keyfactor Brings Enhanced Security for Cloud, DevOps and IoT with Keyfactor Command 7 Release. Nov 22, 2019 611
2019 India Business Survey Report: Covers Fixed & Mobile Services, Cloud, Security, IoT, and Provides Key Implications for Operators. Nov 11, 2019 270
Saudi Arabia Business Survey 2019: Fixed & Mobile Services, Cloud, Security, Technology-Led Automation, and the Key Implications for Operators. Oct 18, 2019 282
SecurEnvoy Welcomes Canadian Cloud IT Service Provider Vickohm as a Key Cloud Services Partner. Oct 14, 2019 538
Centrify to Highlight the Role of Zero Trust Privileged Access Management in Cloud Security at Gitex 2019. Sep 29, 2019 551
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps; Optimises User Experience and Provides Security with Comprehensive Visibility. Sep 19, 2019 779
Zscaler, Crowdstrike rise after announcing cloud security partnership. Sep 17, 2019 149
Spectral Expansion Method for Cloud Reliability Analysis. Kotteswari, K.; Bharathi, A. Sep 1, 2019 4641
The New Version of Kaspersky Security Cloud Strengthens Privacy Control for Apps and Websites. Aug 29, 2019 837
Cloud Access Security Brokers Market Trends, Regulations and Competitive Landscape Outlook to 2028. Aug 29, 2019 1132
New Trends of Cloud Access Security Brokers Market with Worldwide Industry Analysis to 2028. Aug 28, 2019 1147
New Research Report on Wireless Cloud Access Security Brokers Market 2018 to 2028. Aug 22, 2019 1173
Public or private cloud? Why not utilise both? Aug 8, 2019 630
Alibaba Cloud extends integration with the Fortinet Security Fabric to secure cloud migration. Aug 1, 2019 483
Cloud Access Security Brokers Market Growth, Trends, Absolute Opportunity and Value Chain 2018-2028. Jul 26, 2019 1173
Overcoming the Dangers of Virtual Private Networks. Boxley, Don, Jr. Jul 1, 2019 1001
Security, Privacy Concerns Cloud Smart Speaker Ubiquity. Jun 25, 2019 572
An Exhaustive Review on Security Issues in Cloud Computing. Fatima, Shahin; Ahmad, Shish Jun 1, 2019 8335
Half of Businesses Lack Skills Needed to Effectively Manage Cloud Security. May 1, 2019 626
Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel. Wang, Jianhua; Zhao, Zhiyuan; Sun, Lei; Zhu, Zhiqiang Report May 1, 2019 6583
PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing. Su, Mang; Wang, Liangchen May 1, 2019 5625
Cloud Access Security Brokers Market Likely to Touch US$ 13,218.5 Mn in 2024. Apr 23, 2019 423
Cloud Access Security Brokers Market Likely to Touch US$ 13,218.5 Mn in 2024. Apr 22, 2019 724
Tenable Integrates with Google Cloud Security Command Center. Apr 22, 2019 275
Mcafee Mvision cloud achieves AWS security competency status. Apr 21, 2019 339
Minimize Risks Of Multinational Cloud Storage. Mar 25, 2019 871
Cloud native security provider enables customers to secure encrypted data. Mar 8, 2019 203
Cloud native security provider enables customers to secure encrypted data. Mar 8, 2019 189
Cloud native security provider enables customers to secure encrypted data. Mar 8, 2019 203
COMBATING VULNERABILITIES AND EXPOSURES. Schmidt, Victoria Davis Mar 1, 2019 623
Cloud-based Network Security Policy Management to Translate Substantial Growth Ratios. Feb 28, 2019 664
Cloud-based Network Security Policy Management to Translate Substantial Growth Ratios. Feb 28, 2019 610
Cypress, NanoLock collaborate to develop flash-to-cloud management, security. Feb 19, 2019 103
EMEA organisations plan cloud move despite security fears. Feb 5, 2019 285
MSPs Ramp up Security Offerings to Answer Customer Concerns. Feb 1, 2019 411
Business-Critical Cloud Adoption Growing yet Security Gaps Persist. Feb 1, 2019 799
Integrated Design chooses Online Tech's cloud infrastructure. Feb 1, 2019 165
Security concerns prevent cloud, SaaS adoption. Feb 1, 2019 197
Integrated Design chooses Online Tech's cloud infrastructure. Feb 1, 2019 154
Security concerns prevent cloud, SaaS adoption. Feb 1, 2019 187
Integrated Design chooses Online Tech's cloud infrastructure. Feb 1, 2019 165
Security concerns prevent cloud, SaaS adoption. Feb 1, 2019 197
Agent Based Information Security Framework for Hybrid Cloud Computing. Tariq, Muhammad Imran Report Jan 1, 2019 10931
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. Yang, Chao; Guo, Yunfei; Hu, Hongchao; Liu, Wenyan Report Dec 1, 2018 10733
60 per Cent of Organisations Have Not Evaluated Continuity Risks. Brief article Dec 1, 2018 286
State of the Art Intrusion Detection System for Cloud Computing. Ahmad, Azuan; Zainudin, Wan Shafiuddin; Kama, Mohd Nazri; Idris, Norbik Bashah; Saudi, Madihah Mohd; Report Dec 1, 2018 11606
24/7 Expert-Level Network Security Operation Center With Sangfor Security Butler. Nov 21, 2018 445
Expert Network Security 24/7 with SANGFOR Security Butler. Nov 21, 2018 424
ASIGRA KEY PLAYER IN CLOUD BACKUP FOR DATA SECURITY. Nov 1, 2018 574
Human error is to blame for poor cloud security, not the infrastructure itself, warns Claranet. Nov 1, 2018 403
The Perception of Information Security Threats Surrounding the Cloud Computing Environment. Fadhil, Heba Mohammed Nov 1, 2018 2756
iAcademy to offer B.S. Cloud Computing next school year. Oct 15, 2018 688
VERIZON DIGITAL MEDIA ADDS MANAGED CLOUD SECURITY. Oct 1, 2018 334
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. Zhao, Jining; Xu, Chunxiang; Chen, Kefei Technical report Sep 1, 2018 11089
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS). Turkson, Regina Esi; Liao, Yongjian; Baagyere, Edward Yeallakuor Report Sep 1, 2018 9146
RadixCloud Strengthens Managed Backup Services Powered by Asigra to Meet Security and Compliance Challenges. Jul 24, 2018 807
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing. Liu, Guoxiu; Yang, Geng; Wang, Haiwei; Dai, Hua; Zhou, Qiang Report Jul 1, 2018 7171
How Cloud Services Strengthen Security. Breeding, Marshall Jun 1, 2018 1442
Sysdig integrates with Google Cloud security command center. May 8, 2018 203
Sysdig integrates with Google Cloud security command center. May 8, 2018 191
Sysdig integrates with Google Cloud security command center. May 8, 2018 203
Middle East businesses still at risk of cyberattack. May 2, 2018 708
Security, other issues cloud dream of Mindanao Railway System. Apr 24, 2018 1631
McAfee Study Reveals One-In-Four Organizations Using Public Cloud Has Had Data Stolen. Apr 16, 2018 1019
25pc of firms using public cloud have had data stolen. Apr 16, 2018 1034
McAfee study reveals poor visibility as the greatest challenge to cloud adoption. Apr 16, 2018 753
Gemalto enhances security for cloud, hybrid, on-premises data storage deployments. Apr 3, 2018 433
Where in the World is Your Data? Who Can Access It? Grabar, Katherine Apr 1, 2018 9722
Cisco Report: Leaders Rely on Automation, Machine Learning and ArtIficial Intelligence to Defend Against Threats. Report Feb 25, 2018 848
Sizeable gaps emerge between countries on attitudes towards data protection in the cloud. Jan 17, 2018 839
ALIBABA CLOUD OBTAINS C5 ATTESTATION. Jan 1, 2018 593
Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment. Peng, Kai; Leung, Victor C.M.; Zheng, Lixin; Wang, Shangguang; Huang, Chao; Lin, Tao Jan 1, 2018 6238
A Fog Computing Security: 2-Adic Complexity of Balanced Sequences. Hui-Juan, Wang; Yong, Jiang Jan 1, 2018 3867
Homomorphic Evaluation of the Integer Arithmetic Operations for Mobile Edge Computing. Gong, Changqing; Li, Mengfei; Zhao, Liang; Guo, Zhenzhou; Han, Guangjie Jan 1, 2018 9452
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wang, Chenyu; Ding, Ke; Li, Bin; Zhao, Yiming; Xu, Guoai; Guo, Yanhui; Wang, Ping Jan 1, 2018 13516
Priority-Based Cloud Computing Architecture for Multimedia-Enabled Heterogeneous Vehicular Users. Ali, Amjad; Liu, Hongwu; Bashir, Ali Kashif; Sappagh, Shaker El-; Ali, Farman; Baig, Adeel; Park, Da Jan 1, 2018 7350
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Huang, Qinlong; He, Yue; Yue, Wei; Yang, Yixian Jan 1, 2018 7208
Security and Privacy in the Medical Internet of Things: A Review. Sun, Wencheng; Cai, Zhiping; Li, Yangyang; Liu, Fang; Fang, Shengqun; Wang, Guoyan Jan 1, 2018 5764
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Wang, Xin; Yang, Bo; Xia, Zhe; Zhao, Yanqi; Yu, Huifang Jan 1, 2018 9168
A Game Theoretic approach based virtual machine migration for cloud environment security. Mir, Iman El; Kandoussi, El Mehdi; Hanini, Mohamed; Haqiq, Abdelkrim; Kim, Dong Seong Report Dec 1, 2017 7633
Economic Denial of Sustainability Attacks Mitigation in the Cloud. Alosaimi, Wael; Zak, Michal; Al-Begain, Khalid; Alroobaea, Roobaea; Masud, Mehedi Report Dec 1, 2017 9521
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. Yu, Haiyang; Cai, Yongquan; Kong, Shanshan; Ning, Zhenhu; Xue, Fei; Zhong, Han Report Oct 1, 2017 9318
Effective Fog Networking Communications using An Attribute-Based Encryption Scheme Decentralized Server. T., Archana; S., Oviya; R., Janani; S., Ponnarasi Report Oct 1, 2017 2323
Preserving security and privacy in mobile cloud computing health care service w.r.t noncontact ECG monitoring. Prakash, Bora Surya Report Oct 1, 2017 3454
CenturyLink--CenturyLink Announces Significantly Enhanced Managed Private Cloud Service--25/8/2017. Sep 5, 2017 928
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. Xia, Yunhao; Hong, Hanshu; Lin, Guofeng; Sun, Zhixin Report Sep 1, 2017 7342
Design and Implementation of a Mechanism to Secure the Access in Cloud Computing. Sulaiman, Adeeb Hamdoon; Bayati, Hilal Al; Bayounilor, Ahmed Report Sep 1, 2017 6103
CenturyLink--CenturyLink Announces Significantly Enhanced Managed Private Cloud Service--25/8/2017. Aug 29, 2017 928
Thinking of storing information in the cloud? PRI knows the questions you should ask. Jul 1, 2017 505
ThreatConnect enables organisations to orchestrate security across multiple environments: customers can now centrally manage their automated security workflows across cloud virtual and on premises environments. Jul 1, 2017 163
Trustwave expands secure cloud gateway services. Jun 19, 2017 279
Trustwave expands secure cloud gateway services. Jun 19, 2017 269
Trustwave expands secure cloud gateway services. Jun 19, 2017 279
The single factor of most concern in the cloud: with vendors inconsistently offering multifactor authentication, the JofAs annual technology roundtable identifies single sign-on as a possible solution. Drew, Jeff Jun 1, 2017 2590
Independent study reveals 82% of service providers want to provide premium DDoS protection-as-a-service. May 30, 2017 423
Independent study reveals 82% of service providers want to provide premium DDoS protection-as-a-service. May 30, 2017 406
Independent study reveals 82% of service providers want to provide premium DDoS protection-as-a-service. May 30, 2017 423
Fishtech Group plans cloud security operations center. May 22, 2017 129
Fishtech Group plans cloud security operations center. May 22, 2017 118
Fishtech Group plans cloud security operations center. May 22, 2017 129
Cloud, security to dominate IT spending in the next year. May 12, 2017 455
Enhanced multicomponent data secure mechanism for cloud storage system using elliptical curve cryptography. Britto, A. Lauro Eugin; Maheshwari, N. Uma Report May 1, 2017 3904
A review on cloud storage security in distributed computing. Punitha, A. Amali Angel; Indumathi, G. Technical report Apr 30, 2017 3679
CIOs will invest more time, money and skills in security, cloud over the next 3 years: Study. Mar 1, 2017 662
Lightweight intrusion detection of rootkit with VMI-based driver separation mechanism. Cui, Chaoyuan; Wu, Yun; Li, Yonggang; Sun, Bingyu Report Mar 1, 2017 8170
Zyxel ships cloud-managed security gateway. Feb 15, 2017 141
Zyxel ships cloud-managed security gateway. Feb 15, 2017 141
How to achieve IT resilience in the healthcare industry. Scallan, Todd Feb 1, 2017 849
Enhancing trusted cloud computing platform for infrastructure as a service. Kim, Heeyoul Report Feb 1, 2017 5580
Nuvias MEA, Mimecast to meet cloud security demands in Middle East. Jan 20, 2017 197
Nuvias MEA, Mimecast to meet cloud security demands in Middle East. Jan 20, 2017 197
Study on avant-garde Security Techniques in e-Health clouds. Indra, Priyadharshini S.; Vigilson, Prem M. Report Jan 1, 2017 5553
Cloud computing security and forensics issues and awareness of cloud storage users in Malaysia. Keat, Yee Say; Rad, Babak Bashari; Ahmadi, Mohammad Report Jan 1, 2017 7964
Privacy Data Decomposition and Discretization Method for SaaS Services. Ke, Changbo; Huang, Zhiqiu; Xiao, Fu; Liu, Linyuan Report Jan 1, 2017 6889
Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage. Kang, Baoyuan; Wang, Jiaqiang; Shao, Dongyang Report Jan 1, 2017 3766
Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud. Hong, Jun; Wen, Tao; Guo, Quan; Ye, Zhengwang Report Jan 1, 2017 10464
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. Xiangyang, Zhu; Hua, Dai; Xun, Yi; Geng, Yang; Xiao, Li Report Jan 1, 2017 12450
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. Xu, Xiaolong; Zhao, Xuan; Ruan, Feng; Zhang, Jie; Tian, Wei; Dou, Wanchun; Liu, Alex X. Report Jan 1, 2017 9283
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. Gan, Qingqing; Wang, Xiaoming; Wu, Daini Report Jan 1, 2017 8778
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Mao, Jian; Tian, Wenqian; Zhang, Yan; Cui, Jian; Ma, Hanjun; Bian, Jingdong; Liu, Jianwei; Zhang, Ji Report Jan 1, 2017 7906
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. Rong, Hong; Wang, Huimei; Liu, Jian; Hao, Jialu; Xian, Ming Report Jan 1, 2017 13479
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Li, Song; Cui, Jie; Zhong, Hong; Zhang, Yiwen; He, Qiang Report Jan 1, 2017 11543
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. Liu, Keyang; Zhang, Weiming; Dong, Xiaojuan Report Jan 1, 2017 7839
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Li, Ji; Wei, Jianghong; Liu, Wenfen; Hu, Xuexian Report Jan 1, 2017 10745
Multiuser Searchable Encryption with Token Freshness Verification. Sharma, Dhruti; Jinwala, Devesh C. Report Jan 1, 2017 12294
Certificateless Public Auditing Protocol with Constant Verification Time. Kim, Dongmin; Jeong, Ik Rae Report Jan 1, 2017 12354
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. Yang, Pan; Gui, Xiaolin; An, Jian; Tian, Feng Report Jan 1, 2017 7890
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach. Aborujilah, Abdulaziz; Musa, Shahrulniza Report Jan 1, 2017 5322
How e-discovery is safer with cloud providers. Jan 1, 2017 380
SECURITY ISSUES IN CLOUD COMPUTING: A REVIEW. Report Dec 31, 2016 5445
Security under a cloud? Dec 1, 2016 452
An improved multi-server authentication scheme for distributed mobile cloud computing services. Irshad, Azeem; Sher, Muhammad; Ahmad, Hafiz Farooq; Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Report Dec 1, 2016 11628
Cloud adds new dimension to the data security challenge. McKendrick, Joe Dec 1, 2016 730
Managing Risk in Light of 'Shadow IT'. Nov 14, 2016 1452
Can you trust the cloud? Best practices to secure your personal data. Hennig, Nicole Nov 1, 2016 2792
DarkMatter, vArmour to expand data centre, cloud security positioning in Middle East. Oct 21, 2016 175
DarkMatter, vArmour to expand data centre, cloud security positioning in Middle East. Oct 21, 2016 159
DarkMatter, vArmour to expand data centre, cloud security positioning in Middle East. Oct 21, 2016 175
Digital is changing the cyber security landscape, cloud still a top gainer. Oct 10, 2016 429
Cloud managers can park health data overseas, feds say. Oct 10, 2016 631
Fortifying wireless security key to a robust network. Oct 2, 2016 630
Improved cloud security using bio-metric mobile app. Venakatesan, N.; Kumar, M. Rathan Sep 15, 2016 4332
Many companies careless in securing data on cloud: Gemalto Report. Jul 28, 2016 641
Data Flexibility, Security, and Scalability to Boost Cloud Computing in Health Care Industry Market to USD 8.2 Billion by 2020 - iHealthcareAnalyst, Inc.. Jul 9, 2016 610
Just Published: "Global IT Security-as-a-Service 2016-2020". Jul 8, 2016 466
Are cloud security concerns overblown? Jul 1, 2016 367
Intel Security report reveals critical need for improved trust to advance cloud adoption. Jul 1, 2016 665
Enhancing data integrity assurance through detection of data violation using block based determinant approach on cloud storage. Premkumar, P.; Shanthi, D.; Jeevanandha, M. Jun 30, 2016 3202
ParaBlu Partners with SDG Corporation to Take Its Cloud Security Offerings to Enterprises Globally. Jun 4, 2016 392
The seven deadly sins that get companies and their users hacked. Desai, Deepen Jun 1, 2016 1224
Turn to the cloud for accountability: Healthcare's shift to quality outcomes depends on robust connectivity. Jun 1, 2016 1293
A multi-stage security provision for cloud computing. Nagasundaram, S.; Srivatsa, S.K. Jun 1, 2016 2549
Protected scrutinization with key disclosure resistance. Sneha, M.; Bama, R. May 15, 2016 2880
An efficient proxy re-signature technique for preserving data integrity in cloud. Nithya, M.; Thahamina, S.R.; Sandhiya, M. May 1, 2016 2357
Data security for law firms: how to keep client s personal information safe and secure. Whitlock, Justin Apr 15, 2016 776
Firewalls are a key measure to securing cloud services. Apr 1, 2016 333
Against data exceptionalism. Woods, Andrew Keane Apr 1, 2016 6182
Against data exceptionalism. Woods, Andrew Keane Apr 1, 2016 23214
INNOVATIVE APPROACH ENSURING SECURITY AND PRIVACY IN CLOUD COMPUTING. Report Mar 31, 2016 2998
Research on college sports assistant educational administration model in combination with computer. Lei, Zhang Mar 30, 2016 4203
Shadow IT threatens public sector security. Mar 21, 2016 587
ADOMA Focuses on Cloud Computing and IT Security. Mar 11, 2016 362
Secured storage for dynamic data in cloud. Ponnuramu, Veeralakshmi; Tamilselvan, Latha Report Mar 1, 2016 6324
How to address cloud security threats with technology. Feb 18, 2016 980
How to address cloud security threats with technology. Feb 18, 2016 1019
Prosperous protection: Dubai-based du deploys cloud-based vulnerability management. Jan 20, 2016 1575
Privacy-preserving cloud-based personal health record system using attribute-based encryption and anonymous multi-receiver identity-based encryption. Wang, Changji; Xu, Xilei; Shi, Dongyuan; Fang, Jian Report Dec 1, 2015 5016
Newcastle tops national table for cyber security problems; Data breaches will increase in the next few years unless businesses look at how they protect information, companies warned. Oct 12, 2015 931
Cloud attack detection with intelligent rules. Pradeepthi, K.V.; Kannan, A. Report Oct 1, 2015 6619
F5 to prioritise cloud, security at GITEX. Sep 16, 2015 335
Clouding up. Hansen, Adam Sep 1, 2015 1136
Conserving operative discretion under disclosed limitations using cloud. Basha, S. Alaudeen; Vijayakumar, V. Report Aug 1, 2015 2224
2015 CTERA Enterprise Cloud Storage survey highlights data governance and security concerns, continuing preference for private and virtual private clouds. Jun 1, 2015 579
Experts warn of cybersecurity 'storm': a knowledge gap and lax practices put client data at high risk of hacker attacks. Discussion Jun 1, 2015 2692
A framework for an intelligent job migration in hybrid cloud environment. Vijayanand, K.S.; Mala, T. Report Jun 1, 2015 3247
A hierarchical attribute based privacy preserving in cloud data sharing. Iyappan, P.; Anushka, A.; Anitha, T.; Shanthiya, B. Report Jun 1, 2015 4102
Semantic context aware authorization for securing data in cloud. M., Auxilia; Raja, K. Report Jun 1, 2015 2754
A tamper-proof log architecture for cloud forensics. Geetha, V.; Udaya, Ponni N.M.; Devagi, T.C.; Nandhini, Priya M. Report Jun 1, 2015 3323
Intelligent trust based temporal data storage and retrieval methods for cloud databases. Sannasy, Muthurajkumar; Muthuswamy, Vijayalakshmi; Arputharaj, Kannan Report Jun 1, 2015 3247
Secure data sharing in cloud storage using KAC with certificateless encryption. R., Anitha; V., Pandiyaraju; S., Muthurajkumar; L., Sai Ramesh; R., Rakesh Report Jun 1, 2015 3061
The Knowledge Group Has Scheduled a Live Webcast on Cloud Data Security and Its Impact on Healthcare Providers: an Update. May 21, 2015 308
Business Insider Cloud & Security; COMMENT. May 4, 2015 385
Digital vellum and other cures for bit rot. Kosciejew, Marc May 1, 2015 3346
PREVENTION FROM MALICIOUS PROGRAMS FOR HANDLING SECURITY ISSUES IN MOBILE CLOUD COMPUTING. Report Apr 30, 2015 4913
Dome9 Android app secures enterprise access to cloud servers. Mar 20, 2015 300
Dome9 Android app secures enterprise access to cloud servers. Mar 20, 2015 287
Dome9 Android app secures enterprise access to cloud servers. Mar 20, 2015 300
Time to drop Dropbox: why businesses need to abandon consumer cloud services. Sigley, Chris Mar 1, 2015 965
MobileIron provides content security in personal cloud. Feb 4, 2015 227
MobileIron provides content security in personal cloud. Feb 4, 2015 216
MobileIron provides content security in personal cloud. Feb 4, 2015 227
Technology trends to prepare for in 2015: 2015 is expected to be an exciting year for technology, including cybersecurity, wearable technology, social media, 3D printing, cloud computing, and predictive analysis. Roque, Rob Feb 1, 2015 2240
Cloud Security Alliance survey reveals pattern shifts in data security decisions. Jan 12, 2015 159
Cloud Security Alliance survey reveals pattern shifts in data security decisions. Jan 12, 2015 144
Cloud Security Alliance survey reveals pattern shifts in data security decisions. Jan 12, 2015 159
Cloud computing from the CIO's view. Jan 1, 2015 493
Good enough for government work. Lecklider, Tom Dec 1, 2014 1380
Panda Updates Cloud Security with Content Filtering for Exchange and Device Control Improvements. Nov 29, 2014 565
"Scenario-based Cloud Planning Could Minimize Business Disruptions". Nov 20, 2014 581
Deploying Cloud: Availability will win Over Security Concerns. Nov 7, 2014 609
Living in the "cloud". Blizzard, Sonia Nov 1, 2014 1501
Court on cloud computing: ignorance is no excuse. Brief article Nov 1, 2014 289
Cloud control: managing the risks of engaging and terminating cloud services. Boyd, Brian Y. Nov 1, 2014 2873
Research says: focus on business technology agenda to ensure IG success. McKinnon, Cheryl Nov 1, 2014 2624
Snapchat Hacking Scandal: Reasons Local Storage Security Is Better Versus Cloud-Based Service. Oct 14, 2014 417
Security and privacy issues in cloud computing. Ait Ouahman, Amina Abstract Oct 1, 2014 4077
Amal cancels Sadr tribute under security cloud. Aug 22, 2014 726
Xiaomi provides opt-out option for Mi Cloud messaging, due to security concerns. Aug 11, 2014 225
Perfecting security in the cloud. Aug 7, 2014 922
Collaborative Action Helps in Securing the Cloud Environment. Aug 7, 2014 763
How secure is cloud computing? It's only as strong as your weakest link. Gusman, Phil Jul 1, 2014 917
GBM: Gaps in GCC IT and cloud security. Jun 10, 2014 674
GTT reveals top five tips to future-proof your network. Jun 1, 2014 396
Axiom Housing Association Chooses Panda Cloud Fusion to Protect and Manage Their IT Systems. Apr 9, 2014 766
For the wary, an alternative to trusting the cloud: the company behind Bit Torrent offers software that replicates most features of file-synching services but keeps you in control of your data. Simonite, Tom Mar 1, 2014 811
Cisco Adds Advanced Malware Protection to Web and Email Security Appliances and Cloud Web Security. Feb 25, 2014 120
eScan Announces Exclusive Channel Scheme 'Jai Ho' on its Cloud Security SOHO Products. Feb 6, 2014 229
CIOs roundtable seeks solutions on cyber security. Brief article Feb 2, 2014 223
StoAmigo Raises the Bar in Security for Personal Cloud Devices. Jan 8, 2014 491
Cryptography for Security and Privacy in Cloud Computing. Brief article Jan 1, 2014 122
Efficiency and flexibility of fingerprint scheme using partial encryption and discrete wavelet transform to verify user in cloud computing. Yassin, Ali A. Report Jan 1, 2014 6648
Protecting location privacy for outsourced spatial data in cloud storage. Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun Report Jan 1, 2014 7373
Trusted computing strengthens cloud authentication. Ghazizadeh, Eghbal; Zamani, Mazdak; Manan, Jamalul-lail Ab; Alizadeh, Mojtaba Report Jan 1, 2014 9800
A secure and efficient audit mechanism for dynamic shared data in cloud storage. Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo Report Jan 1, 2014 6200
An effective privacy-preserving algorithm based on logistic map and Rubik's cube transformation. Yao, Wenbin; Ye, Pengdi; Li, Xiaoyong Report Jan 1, 2014 7576
OpenText secure messaging cloud services help businesses stay secure. Nov 22, 2013 234
OpenText secure messaging cloud services help businesses stay secure. Nov 22, 2013 222
OpenText secure messaging cloud services help businesses stay secure. Nov 22, 2013 224
Experts warn of risk to cloud storage amidst growing cyber threat. Nov 7, 2013 210
Sahara Net to highlight cloud, security offerings. Sep 30, 2013 199
"Get Smart: Removing 'KAOS' from It Security" Webinar to Explore Unified Cloud Infosec Best Practices for MSPs. Sep 18, 2013 594
Continuous quality monitoring through analytics and cloud computing. Waxer, Nathan; Ninan, David; Ma, Alfred; Dominguez, Norma Sep 1, 2013 1780
Ten Security Concerns to be Kept in Mind While Accessing Cloud. Anisha, P R; Kishor, Kumar Reddy C; Prashanth, S K Report Sep 1, 2013 3765
Fortinet invests and partners with cloud security automation company. Aug 28, 2013 138
Fortinet invests and partners with cloud security automation company. Aug 28, 2013 126
Fortinet invests and partners with cloud security automation company. Aug 28, 2013 128
Cloud security: new buzzword, same challenges. Aug 15, 2013 569
Panda Boosts Security and Control for Organizations with New Features in Panda Cloud Systems Management. Jun 26, 2013 669
How to maintain security in the cloud: seven factors to consider. Hamami, Oren Jun 1, 2013 692
Enhanced time-bound ticket-based mutual authentication scheme for cloud computing. Pippal, Ravi Singh; Jaidhar, C.D.; Tapaswi, Shashikala Report Jun 1, 2013 5689
Benefiting from multi-tenancy solutions. Jun 1, 2013 1027
Panda Security Awarded Place as Government Procurement Service G-Cloud Supplier. May 30, 2013 483
NetAbstraction and Light Point Security Have Signed a Partnership Agreement to Offer Virtualization and Cloud Technologies to Protect Customer's Online Activity. May 30, 2013 624
Cloud Services and Vendor Strategy. May 13, 2013 536
Panda Bolsters Cloud Antivirus with URL Filtering. May 2, 2013 803
Detecting VMs co-residency in the cloud: using cache-based side channel attacks. Si, Yu; Xiaolin, Gui; Jiancai, Lin; Xuejun, Zhang; Junfei, Wang Report May 1, 2013 4710
Thailand takes first step toward G-Cloud computing. Brief article May 1, 2013 156
Is security realistic in cloud computing? Srinivasan, S. Report Apr 1, 2013 8693
Privacy and security in the cloud: a review of guidance and responses. Whitley, Edgar A.; Willcocks, Leslie P.; Venters, Will Report Mar 1, 2013 8007
TELECOMMUNICATIONS : CRITICAL INFRASTRUCTURES: ENISA WARNING ON CLOUD COMPUTING. Feb 15, 2013 226
How sound is the cloud? Goldsborough, Reid Column Feb 1, 2013 798
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment. Jeyanthi, N.; Iyengar, N.Ch.S.N. Report Dec 1, 2012 7352
Cloud computing security issues. Ogigau-Neamtiu, Florin Report Oct 1, 2012 2658
Silver lining: EU's Working Party on data protection releases recommendations on cloud computing. Maleske, Melissa Sep 29, 2012 1226
IT Expert Raj Goel Presents Social Media and Cloud Computing Discussion at ASIS International. Sep 19, 2012 489
Firms still struggling with cloud security. Sep 3, 2012 657
Cloud data security lapse rises to 46pc. Sep 3, 2012 612
Where privacy meets security. Kaser, Dick Sep 1, 2012 634
Compromising cloud security is necessary risk, experts say. Aug 14, 2012 674
Latest Ponemon institute report highlights cloud security concerns. Aug 1, 2012 201
Cyber security considerations when moving to public cloud computing. Badamas, Muhammed A. Report Aug 1, 2012 6644
Panda Security Reports 8 Compatibility for Cloud Antivirus. Jul 1, 2012 373
Cloud security comment. Jun 1, 2012 439
Fortinet/Extreme Networks Debut New Cloud Security. May 31, 2012 695
D-Link to integrate cloud-based monitoring and security into WebSmart switches. May 10, 2012 233
Cloud Security: New Video and White Paper. May 5, 2012 375
Considering the cloud and the greater computing atmosphere: indeed, when considering cloud-computing options, there are definitely a lot of variables and issues to be familiar with. Blowers, Helene May 1, 2012 1654
4 critical trends in IT business continuity. Apr 3, 2012 2148
Report comment from Claranet. Apr 1, 2012 371
Are you ready to navigate the cloud? Security risks turk as the latest IT fad hits health core. Stempniak, Marty Apr 1, 2012 535
The Patchwork Cloud - What's the Deal with Cloud Security? Mar 16, 2012 587
New key technology simplifies data encryption in the cloud. Mar 11, 2012 779
Cloud Governance is More than Security. Feb 3, 2012 929
AirTight Demos Unique Cloud Wi-Fi and Localized Content. Feb 1, 2012 636
Increasing ME organisations in cloud must get virtual security: Trend Micro. Feb 1, 2012 273
Auditing in the cloud: challenges and opportunities. Nicolaou, Christina A.; Nicolaou, Andreas I.; Nicolaou, George D. Jan 1, 2012 4161
Protecting information in a cloud computing environment: a checklist for practitioners. Burns, Brian Jan 1, 2012 2397
HP Enhances Enterprise Cloud Services to Deliver Greater Agility and Improved Security. Dec 28, 2011 331
Big data, security and cloud identified as IT "super themes" in 2012. Dec 21, 2011 866
Three Things Experts Won't Tell You About Cloud Security. Dec 16, 2011 509
Colocation America Announces Partnership with Dome9 Security to Provide Automated Cloud Security. Dec 7, 2011 421
NourNet and Zservices to bring cloud-based web security to Saudi Arabia. Oct 23, 2011 396
Cloud safety. Oct 20, 2011 617
Privacy, Trust and identity in the Cloud. Mike Small Oct 1, 2011 1146
Managing risk in the Cloud. Small, Mike Oct 1, 2011 941
GoGrid And Dome9 Security Partner for Cloud Security. Sep 30, 2011 912
Taming the Cloud - Provisioning and Security. Sep 12, 2011 768
Enterprises in India Report More Security Issues Than Global Counterparts. Aug 26, 2011 576
Frbiz.com: Amazon Enhances Cloud Services Security to Attract More Government Agencies. Aug 22, 2011 310
Amazon steps up service security for government agencies. Aug 17, 2011 243
Huawei seeks world attentions on Cloud Data Security. Aug 15, 2011 198
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Security and Compliance Tool. Aug 13, 2011 698
Salt Lake City Network Security and IT Company Attends DEFCON. Aug 7, 2011 287
Cloud computing: is it safe and secure? Wessels, Tim Jul 29, 2011 618
Trend Micro announces latest enterprise mobile security. Jul 28, 2011 479
Ministries to adopt 'cloud computing'. Jul 17, 2011 371
CloudLock, Backupify and LTech offer Secure Cloud Bundle. Jun 16, 2011 161

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters