- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Web apps and point-of-sale were leading hacker targets in 2013, says Verizon
- Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks
cloud security in pictures
For the last couple of years CIOs and CSOs have been fighting to manage the rising tide of personal devices entering the enterprise. But that's changing as people start to bring their own cloud apps and services into the enterprise. BYOC – Bring your own Cloud – is the new challenge.
Employees who use software-as-a-service (SaaS) applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behaviour and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.
Employees using software-as-a-service (SaaS) cloud applications have so many credentials to keep track of that they're far more likely than non-cloud users to compromise their passwords through insecure storage, a recent survey by service and solutions provider Softchoice has found.
The latest Magic Quadrant for User Authentication market assessment from Gartner has placed SafeNet well ahead of 19 other vendors in the highly competitive and increasingly important segment of the IT security market.
Businesses concerned about the security of cloud-computing systems should appoint a 'cloud purchasing czar' whose sole responsibility is to evaluate cloud service providers (CSPs) and manage their interactions between business and IT executives, a leading security consultant has advised.
Inside the enterprise, the biggest obstacle to cloud computing is often the company's own corporate counsel. Here's how IT is getting to yes with legal.
Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.
Whitepapers about cloud security
The balance between employees’ satisfaction and protection has always been a struggle for IT administrators. There is a clear trend that secure access to enterprise and cloud resources has become a top priority and the challenge has become how you can balance security needs whilst keeping costs down and access convenient. This whitepaper looks at the recent innovations in two-factor authentication and how enterprises successfully walk this tightrope.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.