Enterprise data is travelling beyond network boundaries and outside traditional technology controls, which means that data protection must now extend into the cloud.
Report identifies case for cloud technology in common use systems for airports of the future, while nearly 80% of Australians support the use of biometric security to verify passenger identities.
This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.
This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure.
This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more.
The Cloud Security Alliance (CSA) and Australia's BSI have developed a security certification program for cloud service providers.
A program like PRISM will have limited impact on organisations looking to onboard cloud services hosted in the US, Australia or Europe, according to Puneet Kukreja.
Cloud computing is changing the way businesses deliver IT services to users. It not only provides cost savings and operational efficiencies, it also increases security concerns and compliance challenges. This paper reviews three steps to help maintain control when moving to the cloud.
Leveraging the cloud to bring cost-effectiveness and efficiency to a company must always be coupled with advanced security measures. The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge.
This paper looks at a new range of products.
What would happen to your business if you lost access to critical customer data like orders and invoices? What about that important proposal you’ve been working on for the last three days? How long could your business survive in such a situation?
Research by Context Information Security has identified potentially significant flaws in the implementation of cloud infrastructure services offered by some providers which could be putting their clients’ data at risk. By exploiting the vulnerability, which revolves around data separation, Context consultants were able to gain access to data left on other service users’ ‘dirty disks’, including fragments of customer databases and elements of system information that could, in combination with other data, allow an attacker to take control of other hosted servers.
The McAfee Management for Optimised Virtual Environments AV (antivirus) solution is now available in an agentless deployment option.
VMware is actively raising doubts about the security of Microsoft's Hyper-V. Is there any truth to the claims?
Organisations are leaping head first into virtualisation, given the technology's purported benefits. But those that do it without considering security are taking wild risks.
Before you can secure your virtual environments, you must be able track down your machines.