- AT&T hacker Weev released from prison after appeals court overturns conviction
- Symantec draws new security picture
- German researchers hack Galaxy S5 fingerprint login
- Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA
- JP Morgan to invest £150 million on boosting cyber security
cloud computing in pictures
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
Box has patched the Heartbleed security hole on its servers and has advised its customers to change their passwords.
Dropbox intended to make headlines after introducing Carousel, Dropbox for Business, and the Mailbox app expansion on Wednesday. But the cloud storage company probably didn't expect those headlines to be about another news item altogether: its newest Board member, former U.S. Secretary of State Condoleezza Rice.
With the unveiling of new Carousel and Mailbox apps and the rolling out of Dropbox for Business, CEO Drew Houston made it clear on Wednesday that Dropbox wants to be a bigger part of your day-to-day life. But protesters are threatening to ditch Dropbox from their life completely, thanks to yesterday's appointment of former Secretary of State Condoleezza Rice to the Dropbox board.
Security researchers released technical details and proof-of-concept code for 30 security issues affecting Oracle's Java Cloud Service, some of which could allow attackers to compromise business-critical Java applications deployed on it.
The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.
Almost nine tenths of ICT decision-makers are changing their cloud buying behaviour as a direct result of Edward Snowden's allegations of large scale clandestine cyber-surveillance, a study published today by NTT Communications claims.
, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the
The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud.
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
Whitepapers about cloud computing
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
Sign up now »
Think your endpoints are secure? Think again. Learn why Trend Micro can help.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.