The recent IDC whitepaper offers perspective on Cisco Powered services from 20 Cisco cloud partners.
Security News, Features, and Interviews
Dropbox is consolidating its three Pro account options into a single plan that's priced at US$9.99 per month and includes 1TB of storage and added controls for document sharing and security.
Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services.
Telstra has moved to re-assure customers that their phone conversations are kept private and would be only accessed if a police warrant was in place for a particular customer.
Attorney-General George Brandis has reiterated the government's intention to introduce a mandatory data retention regime but failed to answer a query by Greens Senator Scott Ludlam on what the cost of such a scheme is likely to be.
Medibank is allowing staff outside of the IT department to sign up to cloud services such as Amazon Web Services (AWS) to reduce website hosting costs, while at the same time including IT security in the process, according to Medibank enterprise security manager Mark Burns.
For the Cleveland Indians' IT department, dealing with malware on behalf of hundreds of Windows-using employees at the baseball team's Progressive Field data center operations can be a little bit like a pitcher facing a stacked batting line-up: a constant battle.
Electric carmaker Tesla Motors wants security researchers to hack its vehicles. In coming months, the Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">advanced search techniques</a> on Google or Bing is considered suspicious, what does that make <a href="http://www.shodanhq.com/">Shodan</a> users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
- How video content is powering 12WBT's member and social media marketing strategy
- AMI appoints Lee Tonitto as new CEO
- Cloudwords CMO: Marketing is returning to the human element
- Amazon to acquire video game streaming site Twitch for US$970 million
- Automation and data management technologies top marketing tech list