Cloud Computing Search Engine

Loading

Famed security expert Gary McGraw says the cloud means pluses and minuses for security




Cloud Security Briefing

SearchCloudSecurity.com
By Gary McGraw, Contributor
Not too many decades ago, computers were easy to secure because they came in their own large well-guarded rooms. The "high priests" of the computer room would take in punch cards at the glass window control point, and as long as the paper holding the code was not folded, spindled or mutilated, it might be read by a Hollerith reader and run on the machine.  Only one program ran at a time. Of course if your code had a bug in it, it would be rejected from the room to be debugged hours or days later when the high priests gave it back.
Read more
Subscribe via RSS


Cloud identity and access management aids biotech company
Biotechnology company Genomic Health Inc. grew to 600 employees before its lack of a single system for handling workers' access to its various information systems became unwieldy. It didn't help that, over the past five years, the Redwood City, Calif.-based company added a score of cloud services.
Cloud IAM catching on in the enterprise


Windows 8 authentication: An examination of the new cloud-based option
Companies deploying cloud-based services have discovered how complicated authentication can be. Each cloud service requires a different username and password combination along with multiple types of secondary authentication options, including tokens and certificates. This complexity can create other security risks as users implement common workarounds such as Post-it Notes stuck to monitors and underneath keyboards.
Avoid SSO land mines in the cloud





 

blogger templates 3 columns | Make Money Online