Enterprise IT Security Magazine 1/2011

Enterprise IT Security Magazine 1/2011

Enterprise IT Security Magazine 1/2011

Defining Best Practices for IT Security Within a Cloudy World
by Chris Poulin
Cloud Computing – Is it Worth the Move?
by Gary S. Miliefsky
Coud Computing and Its Security Benefits
by Ajay Porus
Cloud Security Advancement and Its Effects on Data-Centric Persistence Layer
by Stephen Mallik
Evaluating the Security of Multi-Tenant Cloud Architecture
by David Rokita
How Application Intelligence Solves Five Common Cloud Computing Problems
by Patrick Sweeney
Cloud Computing Standards
by Justin Pirie
Firewall, IPS – What’s Next?
by Pavel Minarik
Privileged Identity Management Demystified
by Jim Zierick
Defence-In-Depth The Onion Approach
by Matthew Pascucci
Ready or Not Industrial Cyber Warfare Comes
by Itzik Kotler
Enterprise IT Security Management by the Numbers
by Shayne Champion
Management of Knowledge Based Grids
by Siân Louise Haynes & Stilianos Vidalis
Security Testing
by Mark Lohman
Simplifying IT Security Management
by Richard Stiennon
Security Challenges Facing Enterprises in 2011
by Amit Klein
Top 8 Firewall Capabilities for Effective Application Control
by Patrick Sweeney
YOU As a Password
by Tom Helou

You must be logged in to post a comment