Cloud Security News, Features, and Interviews

News

Imperva security stats confirm even hackers love a World Cup thriller

By David Braue | 22 July, 2014 15:34

The 2014 World Cup soccer grand final between Germany and Argentina was so popular around the world that even hackers took time off from their depredations to watch, a traffic analysis from Imperva has revealed.

With walls breached, document protection is the new security imperative

By David Braue | 22 July, 2014 10:00

Whether driven by hackers becoming more aggressive, or by new regulations increasing visibility around an ongoing problem, growing reports of data theft are prompting organisations to take urgent and proactive measures to protect business documents during every stage of their life cycle.

The week in security: Password managers, IT managers under fire over security disconnect

By David Braue | 21 July, 2014 14:54

Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.

Secure web services

By Ashton Mills | 21 July, 2014 11:54

If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also questionable government agencies with the right tools. Unfortunately, one of the key programs we all use to interface with the net is also the one of the primary vectors of attack -- the humble web browser.

Catch of the Day Breach takes three years to report

By Anthony Caruana | 21 July, 2014 08:15

Catch of the Day claims to be Australia's number one online department store. And a look at their prices and range makes it clear that they have a reasonable claim on that crown.

Reviews

Trend Micro SafeSync online data backup service (50GB)

By Elias Plastiras | 29 June, 2011 16:05

Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.

Slideshows

Canberra's EVOLVE.Cloud hit the streets with topline speakers

By CSO staff | 29 October, 2012 10:19

Canberra's EVOLVE.Cloud hit the streets with topline speakers

Evolve.Cloud hits Sydney with a bang

By CSO staff | 01 May, 2012 14:33

Evolve.Cloud event hosted by Trend Micro including thought leaders from , VMware, Cloud Security Alliance, Government Leaders and Cloud Independent Rob Livingstone at The Sheraton on the Park.

Symantec Vision 2011 Sydney in pictures

By Neerav Bhatt | 13 September, 2011 18:56

Symantec Vision 2011 Sydney in pictures

Features

NEWS FOCUS: Cyber-espionage attacks threaten corporate data in new unrelenting ways

By Ellen Messmer | 08 August, 2011 20:26

Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.

Cloud security: how to protect your data

By CSO staff | 14 June, 2011 21:17

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details.

So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

Opinions

It’s All About the Threat: Five Questions to Ask to Make Sure you Stay Focused

By Ammar Hindi | 27 June, 2014 08:13

Lack of cybersecurity talent coupled with the increasing complexity of threats and networks, a heightened regulatory environment, and an accelerating pace of innovation is driving many organisations to look outside their walls for cybersecurity protection.

Data storage and security in the cloud

By Gordon Makryllos | 03 March, 2014 13:37

With cloud computing continuing its journey as arguably the dominant technology of the current era, so too the way we use it and manage its capabilities continue to evolve. The cloud has given us new ways to think about lots of traditional IT habits and practices, and as more and more data finds its way into the cloud, this extends to subjects like business continuity, disaster recovery and general data security.

De-risking the cloud

By Wayne Tufek | 16 October, 2013 16:43 | 3 Comments

The attractiveness of adopting cloud services continues to grow. Who can argue against access to the latest technologies, a pay as you go model, rapid provisioning/de-provisioning and on demand scaling? All of these benefits lead to improved agility, faster time to market and a business focus on the business (not managing IT). Many of the risks of cloud computing have become less frightening as organisations have become more comfortable with data sovereignty and availability issues.

Establishing a Cloud Broker Model – Part 3

By Puneet Kukreja | 05 August, 2013 14:33

In the age of cloud, internal IT departments are being continuously challenged to demonstrate value and alignment to business requirements and business needs.

UNSW helps close cloud computing's can of (legal) worms

By Stilgherrian | 03 July, 2013 16:07

How does your organisation cope when your data has left the building — or the country? Data sovereignty can be a vital legal issue, because data becomes subject to the laws of the country it's stored in — and that changes the risk profile.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Email Gateway

Clearswift SECURE Email Gateway is an effective and resilient email gateway for 50 to 50,000 users.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.