Home
Downloads
»
Dvd
Games
Software
»
Office
Parent Category
»
Child Category 1
»
Sub Child Category 1
Sub Child Category 2
Sub Child Category 3
Child Category 2
Child Category 3
Child Category 4
Featured
Health
»
Childcare
Doctors
Menu
– Home
– Downloads »
–– Dvd
–– Games
–– Software »
––– Office
– Parent Category »
–– Child Category 1 »
––– Sub Child Category 1
––– Sub Child Category 2
––– Sub Child Category 3
–– Child Category 2
–– Child Category 3
–– Child Category 4
– Featured
– Health »
–– Childcare
–– Doctors
Malaysian Developer
My experience on my daily works... helping others ease each other
CodeProject
Home
Navigation
– Home
Friday, December 30, 2011
Home
»
Information Security
,
IT News
» Top five cloud security tips of 2011
Top five cloud security tips of 2011
December 30, 2011
No comments:
Take a look on the article
Top five cloud security tips of 2011
It summarize the tips based on author's perspective.
Share:
Email This
BlogThis!
Share to X
Share to Facebook
Related Posts:
Carberp Malware a Dangerous New Threat to Financial Information
Nominations to Serve on the Executive Council of ISOC MY
Info. Security Poll - 2011 will be most likely be remembered for:
Virus infects worm by mistake
Hackers In The Box Conferences - HITB2012AMS
← Newer Post
Older Post →
Home
0 comments:
Post a Comment
About Me
Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography
View my complete profile
Popular
Tags
Blog Archives
Setting up Laravel with Homestead on Mac
First - Don't trust your VirtualBox Second - Focus on your Terminal only Then follow the instruction here: https://www.danwalker.com...
AI Audit and the Importance of Having Competent Auditor
"However, efforts to meet AI audit service demands, and by extension, any use of audits by public regulators, face three important chal...
Ionic 4 + React + Capacitor: Publishing Your Apps
Since I don't have Apple Store Developer Account yet, I can only publish on Android, of which at Google Play Store . Head up if you are...
Labels
2025
AGI
AI
AI Ethics
AI Governance and Ethics
Algorithm
Analytics
Android
Angular
API
Apple
Application Development
Architecture
Artificial Intelligence
Artificial Intelligent
Assessment
Audit
Big Data
Binary
Blockchain
Buffer Overflow
C Programs
Certification
Code Project
Codility
Community Group
Comparison
Competition
Conference
Content Writer
Critics
Cryptography and Encryption
Dart
Data
Data Analysis
Data Analytics
Data Integration
Data Sciences
Data Visualization
Database
Design
Digital Transformation
ebook
Education
Embedded
Emerging Technologies
Engineering
Enterprise Architect
ETL
Flex
Flutter
Formal Methods
Forum
Framework
Free/OSS
Generative AI
GIS
GitHub
Google Play
Hackers
Homestead
Information Security
ionic
Ionic Framework
IoT
IP
IR4.0
IT Gadget
IT Jokes
IT News
Java
Javascript
JDK
Jenv
Journal
Kecerdasan Buatan
Kepintaran Buatan
Knowledge Sharing
Laravel
Leadership
Linux
Mac
Machine Learning
Malware
Management
Market Research
Melayu
Microsoft
Mobile Apps
Mobile Development
Mobile World
MySQL
Network
Newsletter
Open Source
Patch and Update
Pentaho
Personal Opinion
PHP
Prediction
Privacy and Trust
Program Analysis
Programming
Project Management
Publications
PWA
Qualitative Review
Quantum
Quiz/Test
R language
R Studio
React
REST
Review/Preview
Robot
Robotics
Sample Code
Sciences
Scripting Language
Security Forum/Conference
Silverlight
Smart Manufacturing
Social
Software Development
Software Security
Solution Architect
SQL Injection
Static Analysis
Symposium
System
System Validation
System Verifications
Systems Architect
Tableau
Talk/Lecture
Technology
Thought Leaders
Tips and Trick
Tool
Training
Typescript
Visualization
Vulnerability
Web Browser
Web-based application
White Paper
Windows Windows 11 Microsoft Experience Technology
Blog Archive
►
2025
(10)
►
March
(4)
►
February
(3)
►
January
(3)
►
2024
(3)
►
December
(1)
►
November
(1)
►
June
(1)
►
2023
(2)
►
November
(1)
►
February
(1)
►
2021
(1)
►
July
(1)
►
2020
(23)
►
December
(1)
►
June
(2)
►
May
(2)
►
April
(5)
►
February
(2)
►
January
(11)
►
2019
(11)
►
December
(4)
►
November
(3)
►
September
(3)
►
July
(1)
►
2018
(10)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(2)
►
August
(1)
►
February
(4)
►
2017
(12)
►
December
(3)
►
October
(1)
►
September
(1)
►
July
(3)
►
May
(1)
►
March
(1)
►
February
(2)
►
2016
(12)
►
December
(1)
►
November
(3)
►
September
(1)
►
June
(2)
►
May
(1)
►
April
(3)
►
January
(1)
►
2015
(19)
►
December
(3)
►
November
(4)
►
September
(2)
►
August
(2)
►
July
(1)
►
June
(2)
►
May
(1)
►
March
(1)
►
February
(1)
►
January
(2)
►
2014
(20)
►
December
(2)
►
November
(1)
►
October
(1)
►
September
(4)
►
August
(3)
►
July
(1)
►
April
(1)
►
February
(2)
►
January
(5)
►
2013
(34)
►
December
(2)
►
November
(2)
►
October
(3)
►
September
(4)
►
August
(3)
►
July
(1)
►
June
(2)
►
May
(3)
►
April
(4)
►
March
(2)
►
February
(1)
►
January
(7)
►
2012
(109)
►
December
(6)
►
November
(3)
►
October
(2)
►
September
(5)
►
August
(2)
►
July
(4)
►
June
(5)
►
May
(4)
►
April
(5)
►
March
(12)
►
February
(13)
►
January
(48)
▼
2011
(110)
▼
December
(38)
10+ free tool for static code analysis
Internet Society Member Newsletter - December 2011
Google Gmail doesn't meet LAPD security needs
Top five cloud security tips of 2011
Methods overloading or overriding
US and Israel is behind Stuxnet and Duqu Malware -...
Decoding malware SSL using Burp proxy
« Public Status Updates Plunged 93% Since Facebook...
The International Conference on Digital Informatio...
Five predictions for security in 2012
Bot Hunter
Think static analysis cures all ills? Think again.
Static Analysis versus Dynamic Analysis
Using C to Blend Mathematics and Art (When Math go...
Top security incidents of 2011
Attack in Quantum Network - Is it possible?
Conference List as of Dec 2011
Decide - When and What to buy Electronic gadget
The 10 Most Important Open Source Projects of 2011...
Linux Job Demand (as of December 2011)
Seminar on Applications of Cutting-edge Statistica...
Public key cryptography and security certificates
Internet Society Launches New Website
Tips on picking right OSS license
Analysis of ‘Operation Black Tulip’: Certificate a...
Research team finds disk encryption foils law enfo...
Advanced Persistent Threats: Are You at Risk?
Exposing Direct Database SQL Injection Attacks
SPIE.org : SPIE Newsroom : Unconditionally secure ...
Should we be taming social media?
Carrier IQ faces lawsuits, lawmaker seeks FTC probe
Malaysian will force IT to be certified.. Is this ...
Hacking Kindle Fire for Android apps
Russia: Massive DDoS Attacks Against Independent W...
Slide for IAS 2011 - Draft Completed
Bill Gates: Trustworthy Computing
Effective and Easy Learning Method - 2
Effective and Easy Learning Method - 1
►
November
(7)
►
October
(8)
►
September
(13)
►
August
(2)
►
July
(4)
►
June
(2)
►
May
(14)
►
April
(17)
►
March
(1)
►
February
(4)
►
2010
(34)
►
December
(6)
►
November
(25)
►
October
(3)
►
2009
(1)
►
May
(1)
►
2008
(3)
►
December
(2)
►
July
(1)
Blogger templates
0 comments:
Post a Comment