Because most security flaws are introduced into enterprise applications during the development process, companies must take proactive steps to build internal security communities and run ‘bug bounty’ programs to convince sympathetic hackers to pick up on bugs before malicious hackers do, the head of security on Australia Post’s high-profile Digital Mailbox effort has advised.
SYDNEY, AUSTRALIA -- Cloud computing with Harbour IT Cloud Solutions is now more flexible and secure due to the firm's new partnership with CommVault. Through CommVault's innovative software used to power Harbour IT's cloud backup and recovery systems, customers now have even greater control to coordinate their own backups when needed.
The fallout from the Commonwealth Bank of Australia (CBA) credit card breach may affect future customer confidence in the financial institution, according to one security expert.
A new trojan makes you pay a ransom to regain access to your own files – and may even leave you feeling grateful.
Symantec announces NetBackup 7 to simplify information management for enterprise organisations
Symantec announces Backup Exec 2010 for Mid-Sized Businesses
NetApp annouces they are expanding their long-standing collaboration with Cisco and VMware to deliver new capabilities for the virtualized data centre
Websense Enhances Web Security Gateway Coverage for Facebook - Announces Integrated Defensio Social Web Threat Detection
Launches Industry’s First Real-Time Security Application for Facebook, Driving Safe Adoption of the Social Web with a Unified Security Solution
F-Secure Internet Security 2010 has a unique feature called Exploit Shield which blocked the “Aurora” Internet Explorer exploit proactively. It did this before the attacks were made and before anyone knew about the vulnerability.
Introducing the VIA EPIA-T700, the first 6cm x 6cm computer-on-module based on the Mobile-ITX form factor
Sign up now »
Splunk collects, indexes and harnesses all the fast moving machine data generated by your applications, servers and devices - physical, virtual and in the cloud.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.