As computational power rises exponentially, not linearly, so does the rate of change - and that means the next 10 years should pack in far more technological change than the last 10.
Julie Bort |
16 Jul |
Read more
The hack of Sony's PlayStation Network in April this year was launched from the Amazon Web Services (AWS) cloud computing platform. But Amazon is keen to emphasise that it has procedures in place to reduce the likelihood of it happening again.
Stilgherrian |
14 Jul |
Read more
A new feature from Google for Google Voice takes the power of the "Report Spam" button and multiplies it exponentially. Google is applying the collected data from thousands of <a href="http://www.pcworld.com/businesscenter/article/204220/gmail_voice_promises_affordable_calling.html">Google Voice users</a> to automatically identify telemarketers and other unwanted calls and send them directly into the spam folder.
Tony Bradley |
14 Jul |
Read more
If companies patch the most popular 37 Windows programs, they could cut their risk by 80 percent, according to a report released on Wednesday by vulnerability management and information firm Secunia.
Robert Lemos |
30 Jun |
Read more
As Distribute.IT's server compromise and subsequent acquisition by Netregistry Group this week has shown, companies who are the subject of a hack attack can be taken out of business permanently. The scale of the Distribute.IT disaster raises issues both for customers who use hosting providers to store sensitive business information and for the providers themselves.
Hamish Barwick |
24 Jun |
Read more
Simon Crosby, the former CTO of Citrix Systems' data center and cloud business, has formed a startup called Bromium that will aim to solve security problems in a cloud environment.
Stephen Lawson |
23 Jun |
Read more
Online storage service Dropbox accidentally turned off password authentication for its 25 million users for four hours on Monday -- although "much less than 1 percent" of those accounts were accessed during the period, the company said. It is still investigating whether any of those accounts were improperly accessed.
Jeremy Kirk |
21 Jun |
Read more
Members of the Open Group's Security for the Cloud and SOA Project have launched a new <a href="http://www.csoonline.com/article/505871/the-curse-of-cloud-security">security architecture for the cloud</a>, to help security organizations better understand the unique security aspects of cloud computing.
Bob Violino |
20 Jun |
Read more
Cloud computing is one of the most significant technological trends we have witnessed and has the potential to change the very way we work. It is, however, important for CIOs to understand that we are currently in a pre-standard era of cloud computing and as such, each organisation needs to be mindful of the myriad of security issues surrounding the cloud. Patrick Eijkenboom, principal consultant at NetIQ, suggests taking a measured approach and asking five security questions before jumping into the cloud.
CIO Staff |
08 Apr |
Read more
One of the biggest announcements from Apple at this week's Worldwide Developers Conference (WWDC) was the unveiling of iCloud. One crucial element was missing from the Apple magic show, though -- will the data be secure?
Tony Bradley |
09 Jun |
Read more
Australia will host a local chapter of the international Cloud Security Alliance to provide a Australia/New Zealand voice to the global Cloud secuity advocacy group.
Hamish Barwick |
13 May |
Read more
People solely relying on patching and upgrades are leading themselves into a false sense of security and individual protection is no longer sufficient in the age of multi-vector attacks, according to the president of the Internet Industry Association of Australia.
Rodney Gedda |
29 Mar |
Read more