Storage security

Results: 1909



#Item
131

OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

Add to Reading List

Source URL: www.ironmountain.sk

Language: English
    132Computing / Cloud computing / Cloud infrastructure / Cloud storage / Cloud Security Alliance / Cloud computing issues / HP Cloud

    Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon PARC

    Add to Reading List

    Source URL: markus-jakobsson.com

    Language: English - Date: 2010-09-01 01:17:59
    133Smartphones / Cross-platform software / Cloud storage / Cloud clients / Mobile operating systems / Mobile application development / Google Play / Cross-site request forgery / App store / Google Drive / Android / Mobile app

    Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-20 23:58:45
    134

    Pivoting to Data-less Endpoints with High Security and Cloud Services Robert Pell, Principal Architect, East Region – Code42 Software Trend 1: Secure Cloud Storage Services •  On-premise Security

    Add to Reading List

    Source URL: macadmins.psu.edu

    Language: English - Date: 2015-07-16 13:42:35
      135Computing / Software / Cloud storage / File hosting / Online backup services / Data synchronization / Internet protocols / OwnCloud / CardDAV / Client-side encryption / Dropbox / Frank Karlitschek

      UnPLUGging From Freemium File Hosting With ownCloud Searching for Privacy & Security in the Era of Big Data Jesse Bufton

      Add to Reading List

      Source URL: pdxlinux.org

      Language: English - Date: 2014-12-02 16:01:11
      136

      Tresorit’s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities. Solutions that

      Add to Reading List

      Source URL: tresorit.com

      Language: English - Date: 2015-11-23 03:14:39
        137

        Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup services from iomartcloud have been designed to deliver the performance, capacity, security and flexibility needed to address today’s on-line

        Add to Reading List

        Source URL: www.iomartcloud.com

        Language: English - Date: 2014-02-20 06:33:27
          138

          OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

          Add to Reading List

          Source URL: www.ironmountain.com.ua

          Language: English
            139Computer hardware / Computer data storage / Non-volatile memory / Computing / Computer memory / Computer storage devices / Computer storage media / Embedded Linux / YAFFS / Flash memory / Solid-state drive / Secure Digital

            Security Analysis of Android Factory Resets Laurent Simon https://www.cl.cam.ac.uk/~lmrs2/

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2015-05-30 16:28:22
            140

            Read It Twice! A mass-storage-based TOCTTOU attack Collin Mulliner and Benjamin Mich´ele Security in Telecommunications Technische Universit¨

            Add to Reading List

            Source URL: www.mulliner.org

            Language: English - Date: 2012-08-17 14:41:57
              UPDATE