Searched for: "managing risk in cloud computing"
- Cloud (155)
- Security (25)
- Cxo (23)
- Data Management (13)
- Big Data (9)
- Data Centers (9)
- Networking (6)
- Mobility (5)
- Enterprise Software (4)
- Microsoft (4)
- Banking (3)
- Consumerization (3)
- Google (3)
- Innovation (3)
- Software (3)
- Collaboration (2)
- Developer (2)
- Open Source (2)
- Project Management (2)
- Virtualization (2)
- After Hours (1)
- Hardware (1)
- Smbs (1)
- Social Enterprise (1)
- Storage (1)
- Tech & Work (1)
About 285 results for "managing risk in cloud computing"
Companies tend towards more availability, less cost, managed risk and agility-all of which are providing by cloud computing. The cloud computing is a way to deliver IT services on ...
Innovation is flourishing in real-time big data technologies, but that could also create problems, says the Reactive movements Jonas Boner.
In the wake of Snowden's surveillance revelations, the US government has to balance security interests with risks to damaging US tech leadership worldwide, concludes the authors of...
Hosting protected healthcare data in the cloud, says Connectria's David Pollard, means you have to find a solid partner and know your on-premise and cloud risks.
The federal government is slowing getting its cloud act together, while the states are moving faster. Matt Asay explains.
Cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing make it possible to store amounts of data. User an entity whose data to be...
An Assessing Approach Based nn FMECA Methodology to Evaluate Security of a Third Party Cloud Provider
Cloud computing is recognized as a great eliminator of the hefty costs and complex processes that come with evaluating, purchasing, configuring or managing software and hardware es...
ClearSky Data is betting it can change how enterprises consume data storage. CTO Lazarus Vekiarides pulls back the curtain and offers details about this startup, which is currently...
Integrate takes a holistic, forward-looking approach to the automation and governance of actuarial modeling and reporting. Powered by Microsoft Azure, Integrate reimagines the rela...
A vulnerability first reported in 1997 can be used by attackers to harvest credentials. Although this is even easier to exploit now, a Microsoft rep is downplaying the risk.