Cloud Security Alliance (CSA), a non-profit industry organization that promotes the protection techniques in the cloud, has recently updated its list of the top threats of cloud in the report entitled “The Notorious Nine Cloud Computing Top Threats in 2013”. CSA indicates that the report reflects the consensus of the experts on the most significant…

IDC claims that “development and test databases remain an area of astonishing waste in terms of both storage and staffing costs at many organizations.” Database copies fulfill requirements across the application development lifecycle, data warehousing and reporting needs. These full copies of production databases often consume far more storage and require resources to complete manual and…

Traders and users who want to use cloud, smartphones and tablets as mobile payment devices card processing should be cautious and wait for the availability of greater protection techniques. It is a recommendation of the PCI Security Standards Council, which considers that, in its current stage, these systems introduce new security challenges. The PCI Security…

Study of cloud computing among 1,300 U.S. and U.K. executives, conducted by Rackspace Hosting with support from Manchester Business School in the U.K., found that cloud technologies enable significant budgetary savings. The objective of this study was to determine whether to allow companies to reduce the cloud computing technology budgets, and determine where they will…

In the “2013 State of the Cloud Report”, CDW found out that about 75% of its respondents have this notion that the personal use of mobile devices and applications by employees influence how businesses take advantage of cloud computing. 68% of the respondents said that organizations have decided to adopt cloud computing because of requests…

Most corporations subscribe and work through computer networks in order for their day-to-day operations to be accomplished. It is also a fact that the internet is widely patronized for research and even communications. However, the internet is not a secure environment and is always susceptible to viruses and hackers. While firewalls are an option for…

In October, we talked about the concept of “ownership in digital publishing“. Now, let’s take a look at how the cloud is affecting authors.  Authors everywhere should be paying homage to Gutenberg, the man who created the printing press late in the mid 15th century. Without him and his invention, books would be non-existent and…

If you are using cloud computing technology in some form, the recent Payment Card Industry Data Security Standard guidelines released should be major news for you. While it is only targeted towards organizations who are already using the technology as a big part of their cardholder data environment (CDE), the guidelines have far reaching consequences…