Build a more secure, mobile cloud environment
Common mobile cloud vulnerabilities and solutions to secure them
From the developerWorks archives
Date archived: November 29, 2016 | First published: June 24, 2011
Users and providers of mobile device access to cloud environments can expect cyber attacks to continue to exploit weaknesses in cloud networks; however, many lessons from the early days of securing desktop environments have carried over to mobile cloud computing. In this article, the author illuminates mobile cloud security issues by looking at the current state of cloud security breaches, vulnerabilities of mobile cloud devices, and how to address those vulnerabilities. He also discusses potential future issues in securing the mobile cloud and opportunities for developers.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.