Cloud Computing Security

View:  
Sorted by:  

How to Locate Data in Cloud Computing

After data goes into the cloud, you may not have control over where your company’s data is stored geographically. Consider these issues connected with cloud computing services: [more…]

How to Control Data in Cloud Computing

Controls on data in the cloud computing environment include the governance policies set in place to make sure that your data can be trusted. The integrity, reliability, and confidentiality of your data [more…]

How to Secure Data for Transport in Cloud Computing

When transporting data in a cloud computing environment, keep two things in mind: Make sure that no one can intercept your data as it moves from point A to point B in the cloud, and make sure that no data [more…]

How to Talk to Your Cloud Computing Vendor about Data

You’re thinking about using some of the data services available for cloud computing. Before you sign the contract, remember that data (especially your company’s data) is a precious asset and you need to [more…]

How Private Cloud and Public Cloud Computing Compare

In the community of cloud community services, confusion and debate continue over the definition of a private cloud. The phrase private cloud refers to a highly virtualized cloud data center located inside [more…]

How to Benefit From Identity Management in Cloud Computing

Identity management’s primary goal in cloud computing is managing personal identity information so that access to computer resources, applications, data, and services is controlled properly. Identity management [more…]

Security Issues with Cloud Computing Virtualization

Using virtual machines complicates IT security in a big way for both companies running private cloud computing and service providers. Virtualization changes the definition of what a server is, so security [more…]

Aspects of Identity Management in Cloud Computing

Identity management is a broad topic that applies to most areas of the data center. However, it’s particularly important in protecting the cloud computing environment. Because the cloud is about sharing [more…]

Detection and Forensics in Cloud Computing

Cloud computing service providers each have their own way of managing security. There are three specific groups of IT security products — activity logs, host-based intrusion protection systems and network-based [more…]

How to Create a Cloud Computing Security Strategy

Even if your IT organization already has a well-designed security strategy, different issues will surface with cloud computing. Therefore, your strategy has to take this different computing model into [more…]

Understanding IT Governance in Cloud Computing

Governance is about making good decisions regarding performance predictability and requiring accountability. This is the case whether you’re governing your own data center or thinking about the cloud. [more…]

What Goes Into Cloud Computing Governance Decisions?

Cloud governance is a shared responsibility between the user of cloud computing services and the cloud provider. Understanding the boundaries of responsibilities and defining an appropriate governance [more…]

Risks of Cloud Computing Governance

IT governance is tightly woven with business goals and policies to ensure that services are optimized for customer expectations. Because IT and business goals are tightly woven in a governance strategy [more…]

How to Make Your Cloud Computing Governance Strategy Work

Effective cloud management can be accomplished partly through people and processes, and partly through technology. It’s really a three-part solution. Your organization needs a governance body to deal with [more…]

How to Ensure Data Security and Privacy in a Hybrid Cloud

Hybrid cloud providers must ensure the security and privacy of your data, but you are ultimately responsible for your company’s data. This means that industry and government regulations created to protect [more…]

Security Risks from Cloud Providers in a Hybrid Cloud Environment

Many security challenges arise when you’re working with an external cloud provider in a hybrid cloud environment. Whether you want to create a private cloud, use a public cloud, or implement a hybrid environment [more…]

Security Risks from Internal End Users in a Hybrid Cloud Environment

You can implement all the latest technical security controls in your hybrid cloud environment and still face security risks if your internal end users don’t have a clear understanding of their role in [more…]

Specific Security Risks in the Hybrid Cloud Environment

Companies working in hybrid cloud environments must consider many types of security risks and governance considerations. Understanding security is a moving target. Education is key to ensuring that everyone [more…]

Developing a Secure Hybrid Cloud Environment

A thoughtful approach to security can succeed in mitigating many security risks in a hybrid cloud environment. To develop a secure hybrid environment, you must assess the current state of your security [more…]

Governance of the Hybrid Cloud: Risks and Expectations

An effective hybrid cloud security strategy requires enforcement and accountability. This is where governance comes in. Basically, governance is about applying policies — the organizing principles and [more…]

Public Clouds versus Private Clouds for Computer Networks

The most common form of cloud computing for networks uses what is known as a public cloud — that is, cloud services that are available to anyone in the world via the Internet. Google Apps is an excellent [more…]

Sign Up for RSS Feeds

Computers & Software

Inside Dummies.com