How to assess a cloud provider’s access control

Depending on what your cloud application is doing, there will be several levels of access control. The simplest is at the file level: the operating system will enforce user/group/world or access control lists

Published on: February 2nd, 2011 David Taber

How to bulletproof your IT systems from hacker attacks

To ensure the security of their IT network companies need to adopt a multi-layered approach, experts say.The strategy, they say, should take into account the fact that end users are now the main

Published on: April 21st, 2008 Brian Jackson