Build a more secure, mobile cloud environment

Common mobile cloud vulnerabilities and solutions to secure them

From the developerWorks archives

Preston Cox

Date archived: November 29, 2016 | First published: June 24, 2011

Users and providers of mobile device access to cloud environments can expect cyber attacks to continue to exploit weaknesses in cloud networks; however, many lessons from the early days of securing desktop environments have carried over to mobile cloud computing. In this article, the author illuminates mobile cloud security issues by looking at the current state of cloud security breaches, vulnerabilities of mobile cloud devices, and how to address those vulnerabilities. He also discusses potential future issues in securing the mobile cloud and opportunities for developers.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Cloud computing
ArticleID=678034
ArticleTitle=Build a more secure, mobile cloud environment
publish-date=06242011