Cloud computing is more than just fast self-service of virtual infrastructure. Developers and admins are looking for ways to provision and manage at scale. This InfoQ article series will focus on automation tools and ideas for maintaining dynamic pools of compute resources.
Security. Cloud. Two words that are almost always together but rarely happily. Read on to learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud.
Mobile operations management (MOM) is one of the top priorities of today’s modern enterprise. While the first generation of MOM solutions evolved around the management of mobile devices and applications, organizations have quickly realized that an effective enterprise mobile infrastructure requires addressing a more difficult challenge: managing and securing mobile business data.
Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2
With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.
Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Cloud backup with MongoDB Management Service (MMS) is covered. 2
Tracking projects is challenging when enterprises adopt agile in product development. Smaller work items and lower work in process improves risk management and supports agile execution and learning. 3
What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.
Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2