Top 5 Cloud Computing Security Concerns
You need to think about security first off if you are moving to the cloud, writes eSecurityPlanet guest columnist Geoff Webb of Credant Technologies.
Microsoft Releases 17 Patches in April, 9 Critical
After a somewhat sleepy 'Patch Tuesday' last month, Microsoft has a blockbuster of security patches for security administrators in April.
NeXpose Accelerates Vulnerability Scanning
How do you make security assessments faster?
Google Chrome 12 Protects Against Malware
Google next browser delivers new security feature to protect against driveby download attacks.
The Epsilon Breach: What Should You Do?
What should companies and consumers do to protect themselves from the email marketing provider breach?
Top Stories by Section
Columnists
More »Blog
More »-
CIO2CEO: Server Huggers
Apr 05, 2011 | John D. Hughes
by John D. Hughes I wish I'd coined the term but, to my severe disappointment, I didn't. I first heard about "server huggers" from Steve Kaplan (VP, INX) at a CIO conference last week in Seattle. Steve uses...
Features
More »-
Top 5 Cloud Computing Security Concerns
You need to think about security first off if you are moving to the cloud, writes eSecurityPlanet guest columnist Geoff Webb of Credant Technologies.
-
Microsoft Releases 17 Patches in April, 9 Critical
After a somewhat sleepy 'Patch Tuesday' last month, Microsoft has a blockbuster of security patches for security administrators in April.
-
NeXpose Accelerates Vulnerability Scanning
How do you make security assessments faster?
-
Google Chrome 12 Protects Against Malware
Google next browser delivers new security feature to protect against driveby download attacks.
-
The Epsilon Breach: What Should You Do?
What should companies and consumers do to protect themselves from the email marketing provider breach?
Most Popular Stories
- 1 Top 20 Android Security Apps
- 2 The Best Way to Remove Viruses, Spyware and other Malware (Part 1)
- 3 Some Users Having Problems with Windows 7 SP1
- 4 Top 10 Android Security Risks
- 5 Pwn2own: BlackBerry and iPhone Fall, Chrome and Firefox Untouched
- 6 How to Remove Malware (part 2): Booting from a CD
- 7 The Best Way to Remove Viruses and Malware, Part 3: The Clean-Up
eBooks, Webcasts, Whitepapers and More
eBook: Deploying and Securing a Wireless LAN. Sponsored by CDW
PDF: Managing a Growing Threat: An Executive's Guide to Web Application Security
Whitepaper: Bridge the Gap Between Development and Operations for Portal and Web Security
Whitepaper: Beyond Disaster Recovery - Becoming a Resilient Business




The security measures discussed in this IBM Redpapers publication represent best practice implementations for cloud security. In this paper, we examined the major security challenges for cloud providers and their clients, and we discussed concrete guidelines for the implementation of cloud security.