- Microsoft says government snooping constitutes an APT event
- 12 suspected cybercriminals arrested in Russia along with Blackhole creator
- Foundation exec slams Microsoft for 'meaningless' security pledge
- From Windows from Vista to 8.1, Microsoft Year-end Patch Tuesday hits 'em all
- Cloud Security Alliance offers ultra-high cloud security plan
- MenuetOS inches towards 1.0
- Senate orders release of Coalition's NBN review
- Brandis quizzed over PM's understanding of metadata
- Black Friday bargains prompt consumers to self-gift iPad Air
- US faces major Internet image problem, former gov't official says
cloud security in pictures
The Cloud Security Alliance (CSA) and BSI have launched a technology-neutral certification they claim provides an additional layer of transparency around security controls used by cloud service providers.
The vast majority of employees who leave a company are honest, upstanding corporate citizens. But you never know when someone might leave on bad terms and then attempt to hack back into your corporate systems.
Developers who were able to bypass Dropbox's security by reverse-engineering Python applications -- the language used by the cloud storage provider -- described their technique in a published paper.
The Supreme Court of Victoria is conducting a trial of a Web-based case management system called RedCrest to lodge case files.
Xero chief executive Rod Drury says he has fielded “a few questions” from customers about the ability of US government agencies such as the NSA to access data stored in the cloud but there have been “no deletions”.
Cloud budgets are rising as IT confronts security and ROI challenges, according to the 2013 Cloud Computing Survey from IDG Enterprise (free download). (Insider: Registration required)
Inside the enterprise, the biggest obstacle to cloud computing is often the company's own corporate counsel. Here's how IT is getting to yes with legal.
RSA President Art Coviello's thoughts on cloud security.
Whitepapers about cloud security
The proposed amendments to the Privacy Act, due to come into effect in 2014, reinforce both the importance and significance of upholding data security. Data protection has long been a priority for many businesses, but the rise in technology trends only create challenges in security protection. This research looks at how businesses are more likely to encounter breaches due to lack or awareness from employees rather than from malicious intent.
In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has become such a fundamental requirement in so many organisations. This survey looks at the authentication landscape in Europe, the Middle East, and Africa, and offers insights into how it is expected to change in the coming years.
Publisher's notes: SoftPerfect Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest