Cloud + virtualisation > Cloud security

Australians main target of OneDrive malware campaign

28 November, 2016 by Dylan Bushell-Embling

Forcepoint Security has discovered a new attack campaign involving using compromised Microsoft OneDrive for Business user accounts to spread malware, and Australians are the number one target.


Blackberry Good Secure EMM Suites

27 January, 2016

BlackBerry has introduced the Good Secure EMM Suites, a set of mobile security, management, productivity and collaboration offerings for businesses in a user-based subscription model.


Do you trust the cloud?

12 August, 2015 by Phil Rodrigues, Vice President, BT Security, AMEA

The majority of Australia's IT decision-makers view the security of cloud-based services as a major concern, in some instances serving as a barrier to adoption.


Microsoft beefs up cloud security, wins ASD cert

23 April, 2015 by Dylan Bushell-Embling

Microsoft has made moves to bolster the security of its cloud offerings, while its cloud services have been certified for the handling of unclassified government data.


Compliance issues lead cloud security concerns

30 March, 2015 by Dylan Bushell-Embling

Organisations worldwide named issues with auditing, compliance and data privacy as their largest cloud security challenges, a survey of Global 2000 companies shows.


Australian businesses lack cloud confidence

29 September, 2014 by Dylan Bushell-Embling

Three-quarters of Australian businesses are investing in the cloud, even though many still lack confidence in cloud services.


Cloud and the new rules for the IT department

21 August, 2014 by Bob West, Chief Trust Officer, CipherCloud

Enterprise data is travelling beyond network boundaries and outside traditional technology controls, which means that data protection must now extend into the cloud.


Cloud, biometrics to change airport experience

29 May, 2014

Report identifies case for cloud technology in common use systems for airports of the future, while nearly 80% of Australians support the use of biometric security to verify passenger identities.


A practical path to unified identity across data centre, cloud and mobile

15 January, 2014

This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.  


Office 365 Single Sign-On: high availability without high complexity

15 January, 2014

This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure. 


Enforcing enterprise-out security for cloud servers

15 January, 2014

This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more. 


Snowden, privacy and cloud services

03 October, 2013 by Puneet Kukreja

A program like PRISM will have limited impact on organisations looking to onboard cloud services hosted in the US, Australia or Europe, according to Puneet Kukreja.


CSA, BSI launch cloud security cert program

03 October, 2013 by Dylan Bushell-Embling

The Cloud Security Alliance (CSA) and Australia's BSI have developed a security certification program for cloud service providers.


Staying secure in a cloudy world

30 September, 2013

Cloud computing is changing the way businesses deliver IT services to users. It not only provides cost savings and operational efficiencies, it also increases security concerns and compliance challenges. This paper reviews three steps to help maintain control when moving to the cloud. 


Identity and access management in the cloud era

10 September, 2013

Leveraging the cloud to bring cost-effectiveness and efficiency to a company must always be coupled with advanced security measures. The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge.
This paper looks at a new range of products. 


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd