Inside the Briefcase

2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to...

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin,...

Unleash the Power of Global Content

Unleash the Power of Global Content

globeYour business depends on pushing accurate and dynamic content...

Clicking Away Your Right to Privacy

Clicking Away Your Right to Privacy

Before using any standard Internet service provider for e-mail...

Top Questions to Ask Before Implementing VoIP

Top Questions to Ask Before Implementing VoIP

Thinking about a move away from traditional phone lines...

Cloud Computing ‘A Security Worry’

November 9, 2011 No Comments

SOURCE: The West

A rise in the popularity of “cloud computing” systems could pose new security threats and a legal minefield for law enforcement agencies, a technology expert has warned.

Cloud computing allows users to outsource their computer software and storage requirements over networks to IT specialists, reducing costs and simplifying the use of the system. But such systems have been identified as a potential problem for law enforcement, with questions raised over issues of jurisdiction, privacy and security.

Edith Cowan University security and network technology senior lecturer Andrew Woodward said police might have trouble locating and accessing cloud computer servers, securing co-operation from other jurisdictions and recovering data if a cloud system failed.

There were also potential privacy concerns and he believed it would pose problems in the future because the popularity of cloud systems was on the rise.

Read More

CLOUD COMPUTING, SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange