Special Report

Cloud computing has just about passed through its hype-and-adoption cycle, with the first rush of enthusiasm replaced by confusion over how to implement cloud and cloud services, but security remains a major roadblock.
Read More Here

The hybrid cloud is quickly being adopted as a best-of-both-worlds solution, to provide cost reductions where possible while ensuring the best security for the most sensitive services and data.
Read More Here

Four identity and access management (IAM) functions—identity provisioning/deprovisioning, authentication and federation, authorization and user profile management, and support for compliance—are essentials for successfully managing identities in the cloud. Read More Here

There is a range of preferences for technologies to protect data in the cloud, including access control, intrusion detection and prevention, firewalls and log management and analysis, but encryption is the clear winner.
Read More Here

Outside of the technical requirements, moving to the cloud and staying compliant with government mandates and guidelines is apparently no easy thing.
Read More Here