The show focuses on nine subject areas this year including: cloud computing, networking, wireless and mobility, virtualization, data center, storage, collaboration, information security and risk ...
As more companies rely on cloud-based technology, particularly because remote working is so widespread, it’s crucial to ensure systems are secure and confidential data remains protected. Using cloud ...
The cloud has become a popular target for hackers in recent years, and the trend is only expected to continue. Since the majority of businesses use at least one private or public cloud-based solution, ...
Listen to the podcast. Find it on iTunes/iPod and Podcast.com. Download or view the transcript. Sponsor: The Open Group. Welcome to a special sponsored podcast discussion coming from The Open Group’s ...
IT leaders now question the effectiveness of security that was built before remote work spiked the use of cloud computing. Do their defenses hold up under widely distributed use? A new cloud security ...
Cloud computing may invoke images of an abstract technological force floating in the atmosphere, but the term itself is misleading. The term originated because on technical diagrams, a cloud was drawn ...
Vendors need to put aside their differences and agree on common principles related to security and the interoperability of cloud platform If cloud computing is to move beyond the hype cycle, vendors ...
The White House this week laid out preliminary cloud computing security guidelines as part of the Federal Risk and Authorization Management Program (FedRAMP). In a 90-page document, the Obama ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results