Cloud activity to explode in 2012
In testing cloud computing services and observing the growth of cloud activities, we've noticed that there are distinct phases that organizations go through in adopting cloud.
In testing cloud computing services and observing the growth of cloud activities, we've noticed that there are distinct phases that organizations go through in adopting cloud.
Conservative MP Louise Mensch has welcomed a landmark ruling in an internet bullying case as an advance for individual liberty. The case involved an anonymous student, known for the purposes of the case as "AMP", whose photographs were distributed by P2P software after her mobile phone was lost or stolen.
While the tag-teaming antics of LulzSec and Anonymous made many a security news headline during the last year, arguably the repeated hacking of Sony
The Tor Project is tapping Amazon's EC2 cloud service to make it easier for volunteers to donate bandwidth to the anonymity network.
Cloud security threats come in all shapes and sizes, so we asked eight experts to weigh in on what they see as the top threat to cloud security. The answers run the gamut, but in all cases, our cloud security panelists believe that these threats can be addressed.