- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
cloud security in pictures
A growing number of SaaS providers offer secure encryption log-in to Dropbox and other cloud storage vendors, meaning even they can't access the data you store. And neither can the government.
The risks of data privacy, residency, security and regulatory compliance remain significant barriers to cloud adoption for many enterprises. While encryption seems like an obvious solution, historically the technology produced usability issues for cloud applications. To complicate matters, putting encryption into the hands of cloud service providers still left the enterprise open to risks such as insider fraud, hacking and disclosure demands from law enforcement.
When smartphone users upload files to cloud-based services, remnants of those files often remain on their handheld device, even if the data is meant to be stored only in the cloud, researchers have found.
To hear founder and CEO Joel Bomgar tell it, he might never have started his eponymous company if he'd had a cooler car.
Outages with large public cloud providers aren't more common than they are with a business' own private infrastructure.
Whitepapers about cloud security
Enterprises of all sizes face the same daunting challenges – increasing mail volumes and new, evolving threats. The Cisco Cloud Security family of services provides customers superior choice of deployment models built on the solid foundation of industry-leading email security technology that protects 40 percent of Fortune 1000 companies from inbound threats and outbound data loss possibilities. Read more.
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
CDex can extract the data directly (digital) from an Audio CD, which is generally called a CD Ripper or a CDDA utility.
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTechnical Consulting ManagerNSW
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTQuality ManagerSA
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia