- AT&T hacker Weev released from prison after appeals court overturns conviction
- Symantec draws new security picture
- Confirmed: hackers can use Heartbleed to steal private SSL keys
- Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA
- Rising security threat should motivate better employee support: Symantec
Start-up Adallom today introduced a cloud-based offering intended to help enterprises better monitor, audit and control use of software-as-a-service (SaaS) applications by employees.
With Australian organisations spending nearly as much on software-as-a-service (SaaS) applications as they are spending to secure their entire IT infrastructure, CSOs need to treat internal users with the same level of distrust as they treat external users, a Forrester Research has advised.
A small team of ex-Symantec security experts has formed a stealthy Silicon Valley start-up called CirroScope that's focused on shielding enterprises from threats stemming from their use of SaaS applications such Box, Salesforce.com and Google Apps.
The popular Snapchat photo-messaging app used mainly by Android and iOS mobile device owners to share images that then self-destruct after 10 seconds is the sort of security idea that businesses say can help them secure online transactions with business partners.
Can you hold Payment Card Information (PCI) data in a cloud-based service? Yes, but doing so isn't straightforward, so the PCI Security Standards Council has published a guideline that clarifies what approaches compliance-minded businesses can take.
Backup, archival, recovery, and redundant operations for business continuity are key success factors for industrial strength IT. But how do the rules of the game change with multi-tenant SaaS applications?
Whitepapers about SaaS
In this infographic, there are two stories. Jeff uses a context-based authentication to securely authenticate on multiple devices. Stella does not. But whichever route your organization chooses to take, authentication solutions ensure that only verified users are able to connect to sensitive corporate assets.
Sign up now »
Reduce fraud losses regardless of channel by preventing cybercrime, identity theft, and other threats targeting your customers.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.