Cloud computing security

Results: 3057



#Item
351Privacy / Computer law / Law / Data breach / Internet privacy / Information privacy / Network neutrality / Cloud computing / Federal Communications Commission / Ethics / Computing / Security

WEEKLY DATA PRIVACY ALERT 6 APRIL 2015 Australia US

Add to Reading List

Source URL: www.squirepattonboggs.com

Language: English - Date: 2015-04-07 06:46:44
352Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:18
353Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:49:47
354Computing / Standards organizations / Computer security / Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Metrology / Cloud computing / Smart grid / Security / Crime prevention / National security

Information Technology Laboratory Letter from the Director T

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-05-19 13:24:18
355Data center / Computer security / Software as a service / Cloud computing security / IICCRD / Computing / Cloud computing / Centralized computing

by SCC We make IT work G-Cloud Accredited Safe Haven

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-30 06:48:45
356Data security / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Privacy / Information security / Computing / NIST Enterprise Architecture Model / Computer security / Security / Ethics

Microsoft Word - M0395_v1_4717582962

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-04-26 21:21:41
357Providence Equity Partners / Private equity / Venture capital / Cloud computing / AlpInvest Partners / Financial economics / Finance / Investment

Providence Equity Partners Invests in VendorSafe Technologies, Names New VendorSafe CEO New Financial Partner Enables Cloud-Managed IT Security Services Leader to Accelerate Growth and Capitalize on Rapidly Growing Data

Add to Reading List

Source URL: www.provequity.com

Language: English - Date: 2014-11-18 17:09:45
358Cloud computing / File hosting / Online backup services / Cloud applications / Dropbox / ISO/IEC 27006 / Information security management system / Public key certificate / Drew Houston / Software / Computing / Data synchronization

Certificate Certificate number: Certified by EY CertifyPoint since: May 13, 2015 Based on certification examination in conformity with defined

Add to Reading List

Source URL: www.dropbox.com

Language: English - Date: 2015-05-15 14:30:05
359Cloud infrastructure / Cloud storage / Data center / Computer security / IBM cloud computing / IICCRD / Cloud computing / Computing / Centralized computing

G-Cloud Linux-asa-Service Secure Management of a Linux Server platform The trusted way to deploy your Linux Servers Built on Sentinel by SCC’s Infrastructure-as-a-Service, our Linux service provides pre-accredited and

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:51:07
360Spamming / Botnets / Denial-of-service attacks / Internet Relay Chat / Android Cloud to Device Messaging Service / Denial-of-service attack / Push technology / Malware / Windows Mobile / Computing / Computer network security / Multi-agent systems

Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-08-15 23:52:07
UPDATE