Evolve.Cloud hits Sydney with a bang
Evolve.Cloud event hosted by Trend Micro including thought leaders from , VMware, Cloud Security Alliance, Government Leaders and Cloud Independent Rob Livingstone at The Sheraton on the Park.
Evolve.Cloud event hosted by Trend Micro including thought leaders from , VMware, Cloud Security Alliance, Government Leaders and Cloud Independent Rob Livingstone at The Sheraton on the Park.
Offshore storage of our personal data and our ability to retain control over it have been marked as concerns for Australians using cloud services, according to a poll commissioned by the industry coalition OzHub.
Australian enterprises may be rushing to embrace cloud computing, but those making the transition must take a proactive approach to infrastructure security that lets them provide consistent information assurance across public, private and hybrid cloud models.
David Braue | 17 Apr | Read more
Australian company Auraya, already a world leader in voice biometric authentication, hopes to break into the lucrative US market with its recently-launched ArmorVox Speaker Identity System.
Stilgherrian | 16 Mar | Read more
SYDNEY, Aust. - March 13, 2012 - In a transaction that will significantly broaden and deepen the authentication and cloud-based services it offers to clients, SafeNet, today announced that it has acquired Cryptocard, a privately held leader of cloud based authentication solutions. Financial terms were not disclosed.
Chris Bowes | 14 Mar | Read more
Software industry lobbyist the Business Software Alliance (BSA) has ranked Australia second out 24 nations for their suitability to cloud computing, and warns that Europe’s high-ranking is under threat due to its controversial proposed data protection overhaul.
It's an oft-repeated mantra: Organizations engaged in or investigating cloud computing in any of its many flavors are concerned about security. In fact, concerns about security, data privacy and data residency are often cited as inhibitors to cloud adoption. But are the concerns justified? Some security experts say visibility and control are the missing elements.
Thor Olavsrud | 18 Feb | Read more
A new <a href="http://www.networkworld.com/topics/security.html">security</a> tool lets enterprise IT groups set access and share policies for employees, including mobile users, who are working with the online Google Apps suite.
Next Tuesday is a big deal. Yes, <a href="http://www.pcworld.com/businesscenter/article/249664/hackers_ask_will_you_be_my_valentine.html">it is Valentine’s Day</a>, but that’s not what I’m talking about. It is also the second Tuesday in the month of February which makes it Patch Tuesday. Microsoft revealed today that there are <a href="http://technet.microsoft.com/en-us/security/bulletin/ms12-feb">nine new security bulletins</a> slated for next Tuesday -- Happy Valentine’s Day?
Tony Bradley | 10 Feb | Read more
Google's new <a href="http://www.pcworld.com/article/247719/visa_certifies_smartphones_for_nfc_payments.html">NFC system</a> that purports to turn your phone into a credit card can be compromised using a brute-force attack -- and that raises questions about its security.
Sarah Jacobsson Purewal | 10 Feb | Read more
Do you think data breaches are up or down in 2011 compared to 2007 or 2008? The official answer may surprise you. According to DatalossDB and the 2011 Data Breach Investigations Report [<a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf">PDF link</a>] by Verizon, the number of records compromised per year has been decreasing since its 2008 peak. But these reports are missing something very important. It all comes down to what is reported. Last year I met with more than 450 CIOs and CSOs, and almost all of them said that incidents are way up. New breaches are constantly making headlines, so why is there a discrepancy between our perception and what these reports are finding?
Jason Clark | 07 Feb | Read more
The trusty telephone is emerging as one of the key elements in new multifactor authentication schemes designed to protect online banking and other web-based financial transactions from rapidly evolving <a href="http://www.networkworld.com/topics/security.html">security</a> threats.
Julie Sartain | 07 Feb | Read more
VeriSign, the generic top-level domain that administers .com, .net and org, was hacked several times in 2010, according to its financial filings.
A report in the Daily Yomiuri suggests that the Japanese government have commissioned Fujitsu Ltd to create a “defensive virus” and that after 3 years of work and a budget of $2.3 million, the project is nearing completion.
Yesterday I talked about my concerns about <a href="http://www.pcworld.com/businesscenter/article/247226/the_cloud_day_20_what_about_security.html">the security of my data</a> if I store it in the cloud. It seems like an awful lot of faith to put in a third-party to expect it to protect my data. However, there is a flip side to that coin that suggests that maybe my data is better off in their hands than mine.
Tony Bradley | 06 Jan | Read more
<a href="http://www.networkworld.com/community/blog/will-windows-8-really-perform-well-low-end-PCs">Windows 8</a> includes a reset function that <a href="http://www.networkworld.com/community/blog/windows-7-vs-windows-8">restores the operating system</a> to a clean state and scrubs data <a href="http://www.networkworld.com/topics/applications.html">applications</a> from the disk, but falls short of making that data unrecoverable, according to Microsoft.
Tim Greene | 05 Jan | Read more
One of the biggest concerns users have with public cloud resources is not knowing how much they will cost, given the pay-as-you-go model.
Brandon Butler | 17 Dec | Read more
It may be that 2<a href="http://www.cso.com.au/article/411067/2011_year_ddos_/" target="_blank">011 was the year of the DDoS</a>, but security experts warn that 2012 could shape up to be the year businesses really pay the piper as a broad range of attacks pummel them for years spent overlooking and underfunding their security.<br />
David Braue | 23 Dec | Read more
The ‘cloud’ is has been growing rapidly. Data centres have an increasingly critical role in the supply of effective and efficient cloud-related services, but adoption can be hindered by concerns over data centre security. Having the correct data centre security in place is vital.
Brahman Thiyagalingham | 13 Dec | Read more
Federal agencies will soon have a government-wide security standard for assessing, authorizing and monitoring cloud products and services.
Jaikumar Vijayan | 09 Dec | Read more