- Linux Foundation's security checklist can help sysadmins harden workstations
- Centrify survey finds unmanaged Apple devices a corporate liability
- Qualcomm's Snapdragon 820 processor gets technology to secure Android phones
- The week in security: The end of Flash ads; Bounty offered as Ashley Madison fallout continues
- 'KeyRaider' iOS malware targets jailbroken devices
A Whitepaper on Cloud Computing
This whitepaper will help to clarify exactly what the different models of Cloud Computing are, how the different models should be used, and when to embrace these models.
Please supply your email address to access the content.