In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine" threats associated with cloud computing, and moving on to a clear and cogent primer on the technology along with sensible recommendations on how to deploy it across the cloud.
Here's what you'll get in this spotlight:
- Recommendations on deploying security across the cloud
- Providing real-world examples of implementing identity management
- A guide to available encryption offerings and how to match them against your security needs