Tag Archives: security procedures

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy “No matter how many times a privileged straight white male technology executive pronounces the death of privacy, Privacy Is Not Dead. People of all ages care deeply about privacy and they care just as much about privacy online as they do offline” (Danah Boyd) Security and Privacy are

Why BYOD Is Boosting Business Cloud Computing Adoption

Why BYOD Is Boosting Business Cloud Computing Adoption

Why BYOD Is Boosting Business Cloud Computing Adoption The popularity of BYOD (or ‘Bring Your Own Device’) has surged in recent years, with around 67% of employees bringing their own computing tech into the office for work – whether that’s something large like a laptop to function as your ‘office computer’, or something smaller like

CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security Everyday there are more articles citing security as the top concern holding back public cloud adoption. While cloud means many things to different people, so does the term security. In discussions with business and industry experts, security concerns really boil down to the classic CIA—now CIAA—triad: confidentiality,

Privacy In Cloud Computing: Assured Or Assumed?

Privacy In Cloud Computing: Assured Or Assumed? All avid computer users have enjoyed the benefits and conveniences of cloud computing, either knowingly or unknowingly. Most of us rarely understand what is happening behind the screens, especially when lost in interesting movie or music, or even when perusing the information about your competitors. As a result,