Regarding the ownCloud service, where confidential data maybe stored, the first thing to do is to secure the frond end seting up an SSL security and force HTTPS connection so that your passwords do not circulate in clear text on the WWW. It’s take less than 10 minutes and that prevent some data leak. See
DISASTER RECOVERY [RE]DEFINED – 3 PART SERIES- PART 2 5 Tips On Building A Business Continuity Plan In my last post, I defined a disaster and how to plan for the expected. I will now dive into how to build a business based on my earlier definition of a disaster, let’s agree for a moment
Gartner Sees Cloud Security Services Surge Cloud-based tokenisation and encryption, vulnerability assessment, SIEM and web application firewalls will see the strongest growth, according to Gartner On November 4, 2013 by Nathan Eddy eWEEK USA 2013. Ziff Davis Enterprise Inc. All Rights Reserved. 0 The cloud-based security services market will be worth $2.1 billion (£1.32bn) in
Gartner Sees Cloud Security Services Surge Cloud-based tokenisation and encryption, vulnerability assessment, SIEM and web application firewalls will see the strongest growth, according to Gartner On November 4, 2013 by Nathan Eddy eWEEK USA 2013. Ziff Davis Enterprise Inc. All Rights Reserved. 0 The cloud-based security services market will be worth $2.1 billion (£1.32bn) in
SEC524: Cloud Security Fundamentals The SANS Cloud Security Fundamentals course starts out with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between. Each of these delivery models represents an entirely separate set of security conditions to
MISSION STATEMENT To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. via Cloud Security Alliance.