Criminal activity is a growing menace on the internet. This inevitably means more diligence is required by legitimate users in the face of an increasingly sophisticated criminal threat. Robert Sheldon describes some of the emerging threats and risks.… Read more27 March 2015
Although Windows Azure can be used from the portal, it comes into its own once provisioning, deployments and maintenance can be automated or undertaken with specialized tools. To reach this stage, you need to understand Windows Azure Management Certificates. Mike Wood brings all this information into one article and guides you through the process. … Read more26 June 2012
The cloud isn't any more, or less, inherently secure than any other platform. To be confident that your cloud data is secure, there are several precautions you can take, as Ming describes.… Read more31 May 2012
Windows Azure Access Control Service can be used to integrate your application's authentication and authorization logic with whatever Identity providers you wish, as long as they support one of the security protocols that the service understands… Read more
Subscribe for more articles
Fortnightly newsletters help sharpen your skills and keep you ahead, with articles, ebooks and opinion to keep you informed.
Want more? Subscribe to our fortnightly newsletter