Cloud Computing

Cloud Computing | News, how-tos, features, reviews, and videos

cloud blueprint schematic

Achieving compliance in the cloud

More and more organizations are moving towards cloud technologies for scalability, cost reduction, and new service offerings. In this short article we will review cloud basics and look at auditing for compliance challenges.

email cloud

Email, email, in the cloud

The transition from on-premises to cloud-based email is an opportunity to tighten security controls.

internet of things

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

cloud security

10 interview questions for hiring cloud-literate security staff

The answers will paint a picture of whether this candidate understands cloud security.

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

walking dead cloud zombies apocalypse

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

devops

The intersection of DevOps and application security

This article discusses DevOps security and the application security tools that need to be embedded within its process. These additions enable proper InfoSec protection of web applications.

fave raves security

5 must-have security tools

Trusted IT security gear protects data, authenticates users and monitors systems for suspicious events.

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

icloud rain

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

forest fog woods

Taming the SaaS security wilderness

As rogue applications proliferate, the need to protect corporate data requires new tools.

video

What is serverless computing?

In this animation, Network World explains some of the concepts of serverless computing, and how it represents the next phase of cloud computing for Internet of Things applications and products.

cloud question

After Amazon outage, HealthExpense worries about cloud lock-in

Financial services companies as popular targets of cybercriminals for the obvious reason -- they're where the money's at. And health care companies have medical records, which are very valuable on the black market since the...

microsoft iot insider labs 03

Here's how Microsoft is helping companies build IoT hardware

One of the biggest challenges with building connected hardware is getting from proof-of-concept (PoC) prototypes to a devices that are ready for a large-scale production rollout. Microsoft is aiming to help with that issue through a...

cloud architecture skyscrapers

Problems that arise with cloud to cloud interactions

Some companies have multiple applications in different public clouds. There is a possibility that some public cloud applications need to access another public cloud's application data. Should this architecture be allowed?

dirty numbers playground

Microsoft keeps to Bill Gates' roots of cybersecurity

A look at the software giant's startling cybersecurity statistics.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

aws logo stock reinvent

AWS says a typo caused the massive S3 failure this week

Everyone makes mistakes. But working at Amazon Web Services means an incorrectly entered input can lead to a massive outage that cripples popular websites and services.

fuel pod aircraft carrier jet

Hacking for Defense to solve national security challenges

As the speed and complexity of America's national security threats increase, so too must its response. Using Lean Startup methodologies, schools like Stanford and Georgetown University are harnessing the collective intellect of their...

Load More