Converting to cloud: Ranum Q&A with Lee Heath

Data Security and Cloud Computing

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Successful cloud migrations require careful planning

    This month’s Information Security magazine online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new se... 

  • 2013 Security 7 award winners revealed

    Inside, uncover the winners of our Security 7 awards, which recognize outstanding information security professionals in seven sectors. 

  • Virtualization security dynamics get old

    Virtualization and cloud computing are more popular than ever, yet bolted-on security remains the norm. Chris Hoff explains what needs to change. 

  • Best of cloud security 2013

    See which vendors' offerings our readers voted to be the best cloud security products of the year in our 2013 Readers' Choice Awards. 

  • Readers' Choice Awards 2012

    For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories. 

  • homomorphic encryption

    Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.  Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without c... 

About Data Security and Cloud Computing

Because cloud-based services use the Internet, storing data in the cloud can be risky and can mean less control over your data. As an IT manager, how do you decide which kinds of data to store in the cloud, stay compliant with government regulations, and maintain control and protect your data in a cloud-based model? In this section we cover the legal and compliance ramifications of shifting workloads to cloud computing services and how your data is segregated and protected in the cloud. Read news, technical tips and analysis on data security in the cloud, including encrypting data in the cloud, network security for cloud-based enterprise applications, operating system security for cloud based enterprise applications, data security for cloud-based enterprise applications, virtualization security for cloud-based enterprise applications and regulatory issues for cloud-based enterprise applications. This topic also covers security for cloud based applications, identity and access management in the cloud and medical records privacy.