Quantcast
Channel: CCSK Guide » access control
Browsing latest articles
Browse All 10 View Live

Security in the Cloud

Cloud computing was certainly a buzz phrase for 2010, with recession-hit companies realizing that they could tap into the cloud to gain access to infrastructure resources or business applications....

View Article



Apple iCloud

On June 6, 2011, Apple CEO Steve Jobs announced the upcoming fall release of iCloud, on online cloud storage service designed to wirelessly store and share music, email, photos calendars and other data...

View Article

Cloud Security Doubts: Firewall Risk Management

While more and more enterprises these days are using cloud infrastructures, the majority of executives are doubtful of their ability to secure their IT systems. This article takes a look at a special...

View Article

Verizon’s Data Breach Investigations Report 2011

In April 2011, Verizon released the 2011 Data Breach Investigations Report, its fourth installment thus far. While many industry insiders ignore these sorts of reports, as vendor-focused or as...

View Article

SpiderOak: High-Security Cloud Storage

SpiderOak is an attractive, secure solution for file synchronization across multiple PCs and mobile devices running different operating systems and browsers. With the advent of cloud services and the...

View Article


Identity Management Tools in the Cloud

Identity management is an often vague category, especially in cloud environments. Here, we understand “identity management” as a set of policies and tools that identify individuals within a system or...

View Article

BYOD: Bring Your Own Device

What is BYOD? BYOD stands for Bring Your Own Device. It is a business policy that gives employees the right to bring their own mobile devices to work. According to this policy, the employees are...

View Article

Cloud-Based Identity Management Solutions: Options, Risks, Advantages

Cloud-based identity management is very important for everyone. Companies or even individuals cannot afford for things to go wrong. It is vital to have the right digital image in the cloud, as it tells...

View Article


Securing Identities in the Cloud – Cloud-Based Identity Management Solutions

The cloud identity is a user’s digital identity. Many of us in the industry are aware of this term as it has been commonly used for some time now. Cloud-based identity management is very important. One...

View Article


Data Protection as a Service

A recent Microsoft survey found that 58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. However, over 90 percent remain concerned about...

View Article
Browsing latest articles
Browse All 10 View Live


Latest Images