As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare’s Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have more exposure points than we realise.
Vulnerability management still wanting as Australian businesses struggle to stay ahead of security risks. Australian businesses are still suffering from deﬁcient vulnerability scanning practices, according to new survey data suggesting the industry is shifting away from implementing speciﬁc technologies and towards broader capabilities including cloud security and incident detection and response.
The proposed amendments to the Privacy Act, due to come into effect in 2014, reinforce both the importance and significance of upholding data security. Data protection has long been a priority for many businesses, but the rise in technology trends only create challenges in security protection. This research looks at how businesses are more likely to encounter breaches due to lack or awareness from employees rather than from malicious intent.
The balance between employees’ satisfaction and protection has always been a struggle for IT administrators. There is a clear trend that secure access to enterprise and cloud resources has become a top priority and the challenge has become how you can balance security needs whilst keeping costs down and access convenient. This whitepaper looks at the recent innovations in two-factor authentication and how enterprises successfully walk this tightrope.
As the world becomes increasingly hyper-connected, the opportunities for innovation and new business models are virtually limitless. However, with so much business-critical information at stake, the need to protect a company's IT assets is more important than ever before. This paper aims to profile the emerging players who comprise today’s emerging threat ecosystem; today's trends and the latest insights into the future.
Greater flexibility, improved performance, lower costs – the list of cloud benefits goes on and on. While moving your financial system to the cloud may seem straightforward, truly realizing the advantages of the cloud requires a complete understanding how it will integrate with existing applications and systems.
This valuable resource explores the need for seamless integration when adopting a cloud strategy, and introduces an approach that can ease your integration woes. Read on to learn more now.
Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.
Cunningham Lindsey, a leading claims management company that specializes in fraud, not only uncovered an organized fraud ring but also established an efficient process for helping their insurance customers identify legitimate claims from the fraudulent ones. In this case study, find out how possible fraudulent claims were flagged, leading to the discovery of a criminal fraud.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.