Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud. Access >>>
Table of contents
- Cloud formation
- Cloud risk assessment
- Role of cloud encryption
Premium Content for Free.
More Premium Content Accessible For Free
Memory corruption attacks
Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A ...
Tactics to combat insider threat
This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a ...
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.