data centres - News, Features, and Slideshows
- From IT Security to Information Security — How Technology Is Not The Greatest Challenge in Protecting Your Information Online
From IT Security to Information Security — How Technology Is Not The Greatest Challenge in Protecting Your Information Online
Michael Rothery, First Assistance Secretary for National Security Resilience Policy at Department of the Attorney General says that in order to deliver effective security and risk management the key question is "Who owns the risk?".
LivePerson's plans to open an Australian data centre later this year will increase the collection of sensitive personal information, but careful security controls will ensure that the high-value personal information regularly exchanged during online chat sessions is protected before being stored for later analysis, a company executive has confirmed.
Australian organisations’ growing comfort with the security of hosted cloud services is paving the way for increased investment in local data centre space and new approaches to cloud-related infrastructure models as Verizon, Rackspace and others push new facilities into an ever-busier market.
The ‘cloud’ is has been growing rapidly. Data centres have an increasingly critical role in the supply of effective and efficient cloud-related services, but adoption can be hindered by concerns over data centre security. Having the correct data centre security in place is vital.
Preparing to really push the virtualization envelope? Check! Readying an aggressive cloud strategy? Check! Gearing up to embrace mobility and consumerization of IT? Check! Having a datacenter network capable of securely supporting all this? Maybe not.
As Hurricane Ike bore down on Houston one Friday last September, the Continental Airlines' flight operations center, located on the 14th floor of a glass-sided downtown high rise, suddenly went dark. For the airline's pilots and flight crews, however, business proceeded as usual.
Sign up now »
Deep Discovery is uniquely designed for threat detection, real-time intelligence, adaptive protection, and rapid response to combat targeted attacks and Advanced Persistent Threats (APTs).
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.