- Seven technology predictions for 2014
- Blue Cross: 840,000 healthcare records at risk after laptop theft
- French Treasury accidentally signs SSL certificate for Google.com domains
- Transform IT security process into business action, CSOs advise
- Hacker-built drone can hunt, hijack other drones
cloud security in pictures
The latest Magic Quadrant for User Authentication market assessment from Gartner has placed SafeNet well ahead of 19 other vendors in the highly competitive and increasingly important segment of the IT security market.
Businesses concerned about the security of cloud-computing systems should appoint a 'cloud purchasing czar' whose sole responsibility is to evaluate cloud service providers (CSPs) and manage their interactions between business and IT executives, a leading security consultant has advised.
Well-established cloud customers may have a reasonably good understanding of the risks and procedures necessary to make the most of the model, but new entrants will face a steep learning curve that requires ongoing involvement with the business organisation to resolve, the University of Melbourne's IT security and risk management head has warned.
The headlines may be filled with cyber-attacks and government-level efforts to boost IT security, but for the average CIO, 2013’s security challenges revolve around the myriad threats posed by ever more powerful business agendas.
The explosion in demand for bring-your-own-device (BYOD) policies and the maturation of cloud computing, in particular, are escalating IT security to the highest levels of the executive.
Cloud-computing consultancy Paradyne will offer its customers cloud identity and access management (IAM) tools from Centrify, giving that company’s cloud-based single sign-on (SSO) technology a big leg up in a local market where cloud-based services are rapidly gaining enterprise legitimacy.
Inside the enterprise, the biggest obstacle to cloud computing is often the company's own corporate counsel. Here's how IT is getting to yes with legal.
Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.
Whitepapers about cloud security
The balance between employees’ satisfaction and protection has always been a struggle for IT administrators. There is a clear trend that secure access to enterprise and cloud resources has become a top priority and the challenge has become how you can balance security needs whilst keeping costs down and access convenient. This whitepaper looks at the recent innovations in two-factor authentication and how enterprises successfully walk this tightrope.
Sign up now »
Enforce compliance consistently and cost-effectively across your organization.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.