TITLE

Securing the Hyper-Extended Network

AUTHOR(S)
Walsh, Lawrence
PUB. DATE
June 2009
SOURCE
Channel Insider;6/11/2009, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
A blog discussing the importance of information security in cloud computing and mobile services is presented.
ACCESSION #
43516706

 

Related Articles

  • Cloud computing: Is it safe and secure? Wessels, Tim // New Hampshire Business Review;7/29/2011, Vol. 33 Issue 16, p18 

    The article discusses facts about cloud computing and how it addresses computer security.

  • How to...Dispel misconceptions in the private cloud.  // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2012, p9 

    The article dispels misconceptions about private cloud computing, including the notion equating private cloud with virtualisation.

  • The darkest cloud in the sky. Hajek, Jeff // SC Magazine: For IT Security Professionals (15476693);Oct2010, Vol. 21 Issue 10, p18 

    The author asserts that security will play a critical role in the long-term success of cloud computing.

  • Cloud security: Root of trust. Antonopoulos, Andrea // Network World;2/8/2010, Vol. 27 Issue 3, p14 

    The article discusses the advantages of cloud computing and its potential risks.

  • Private Cloud?  // Network World;6/21/2010, Vol. 27 Issue 12, p38 

    The article provides insights from related regarding cloud computing, which is an Internet-based computing, and its security issues.

  • Oh boy! A new group. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Mar2012, Vol. 23 Issue 3, p31 

    An introduction to the journal is presented in which the editor talks about reports within the issue including virtualization and the cloud, unified threat management (UTM) systems, and evaluation of 14 UTM products.

  • Skills in demand. Potters, Michael // SC Magazine: For IT Security Professionals (15476693);Apr2011, Vol. 22 Issue 4, p15 

    The article focuses on the demand for cloud/security knowledge within several U.S. professions in 2011 including network engineer, solutions architect, sales engineers and sales manager.

  • Snowden revelations could cloud skies for U.S.-based tech companies.  // InsideCounsel;Nov2013, Vol. 24 Issue 263, p58 

    The article reports on the implications of the ability of the U.S. government program to collect and view information on a larger scale, also known as Snowden effect, on cloud computing service providers in the U.S.

  • Securing Data in the Cloud -- To Encrypt, Authenticate, or Both? McNair, Ed // Information-management.com;10/28/2016, p3 

    The article discusses how enterprises need to be more concerned about security as more daily business is done in the cloud.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics