- Transform IT security process into business action, CSOs advise
- In Pictures: The biggest Internet security challenges of 2013
- Disqus scrambles after leak fuels Swedish tabloid exposé
- Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
- Microsoft Patch Tuesday reinforces the value of software upgrades
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
Cloud in pictures
In theory, cloud computing offers a fairly straightforward model for consuming compute and storage resources. Customers request capacity, it is provided by a vendor and it is paid for. Customers should be able to spin up and down resources as they need to and only pay for what they use.
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat.
Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June.
Wouldn't it be cool if you had a "magic" folder on your PC, one that automatically synced its contents with the Web, your other PCs, your cell phone, and other devices?
Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour.
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
When most people who track the industry think of the Cloud computing market, big names like Amazon Web Services, Microsoft Azure, Google, Rackspace, Verizon Terremark and others come to mind. HP, Joyent, IBM and Dell even. But Computer Sciences Corporation (CSC)?
It is quite a stretch for most cloud service providers to match the geographical reach of Amazon Web Services.
A private Cloud looks and acts like a public Cloud, giving your corporation all the speed, agility and cost savings promised by Cloud technology, only it's single-tenant, and that tenant is you, right? Well, that's the goal, but it's not quite the reality yet for most enterprises.
Whitepapers about Cloud
Backing up data today is growing more complex - and in an era of virtualisation, big data and cloud deployments, it can be difficult to maintain control over your data, resulting in loss and downtime. This hour-long webcast features expert commentary on navigating the complexity of backing up a heavily virtualised infrastructure; simplifying your backup software and hardware ecosystem; reducing the cost of backing up your organisation’s data, and modernising your backup infrastructure with integration. The presentations will conclude with an interactive Q&A session.
How can you avoid making major mistakes when operating and maintaining your data centre(s)? The key lies in the methodology behind your operations and maintenance program. This whitepaper explores the top ten mistakes in data centre operations. Read now.
Microsoft Security Essentials provides your home PC with real-time protection. It constantly uses the latest technology ensuring that you will always stay up to date ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report
- Why Shazam is helping advertisers hit the right tune with consumers
- Twitter, the protector of news?
- B2B customers are increasingly led by consumer habits and experience