As more people shift operations to the cloud, the demand for greater cloud data security will rise. There are already many companies who specialise in data security, but it is also important for users to know how to protect themselves. This is quite a detailed article on data security, and I think I would have to send it to my printers so that I can read it in my own time later. Thanks for the information!
Simon - http://www.idpro.co.uk
A very informative article on secure data access over cloud. I was just wondering if , in addition to all the data protection methods enlisted in this articles, is it also possible to have some kind of data chaining. By data chaining I mean the sequence in which the applications would access various data objects. For all authorized applications there will be a predefined chain or sequence to access the data.
If an out of sequence data request comes then we could suspect that it is from a spurious application trying to break-in.
Good article, it explains the issues involved with trying secure information through the Cloud where you never know precisely where all of the copies and backups of the data may reside. Clearly, the simple file management techniques currently in use are inadequate to ensure the level of safety required for important data.
Drones are, in essence, flying autonomous vehicles. Pros and cons surrounding drones today might well foreshadow the debate over the development of self-driving cars. In the context of a strongly regulated aviation industry, "self-flying" drones pose a fresh challenge. How safe is it to fly drones in different environments? Should drones be required for visual line of sight – as are piloted airplanes? Join EE Times' Junko Yoshida as she moderates a panel of drone experts.