BT

Your opinion matters! Please fill in the InfoQ Survey!

rss
  • Cloud Follow 108 Followers

    Cloud Data Auditing Techniques with a Focus on Privacy and Security

    by Manjur Kolhar Follow 0 Followers , Mosleh M. Abu-Alhaj Follow 0 Followers , Saied M. Abd El-atty Follow 0 Followers on  Jul 30, 2017

    The authors provide a guide to the current literature regarding comprehensive auditing methodologies. They not only identify and categorize the different approaches to cloud data integrity and privacy but also compare and analyze their relative merits. For example, their research lists the strengths and weaknesses of earlier work on cloud auditing, which allows researchers to design new methods.

  • DevOps Follow 351 Followers

    Securing the Modern Software Delivery Lifecycle

    by Dustin Collins Follow 0 Followers on  Feb 27, 2016 1

    Information security practice has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we think about securing our infrastructure and applications.

  • Followers

    Answering Common Cloud Security Questions from CIOs

    by Gilad Parran-Nissany Follow 0 Followers on  Feb 12, 2014 2

    With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.

Followers

Keeping Your Secrets

Posted by Dennis Sosnoski Follow 0 Followers on  Sep 30, 2013

Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2

Followers

Automating Data Protection Across the Enterprise

Posted by Arshad Noor Follow 0 Followers on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise. 1

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT