This article was originally published on Technology.Info.
As part of our continuing strategy for growth, ITProPortal has joined forces with Technology.Info to help us bring you the very best coverage we possibly can.
- Understand cloud security threats
- Gain insight into cloud security risk assessment
- Know where cloud service provider security ends and cloud application security begins
- Learn about the tools cloud providers make available to mitigate security risk
The rise of public cloud computing has brought with it a new set of security and data privacy considerations that are not widely understood. This session will describe public cloud hoster and customer threat models and explain the role in those models of encryption-at-rest, encryption-in-flight and other security best practices.