cloud security alliance - News, Features, and Slideshows
Cloud computing has become ubiquitous for many companies but keeping it secure can be a challenge. Cloud Security Alliance Asia Pacific executive council chairman Ken Low shared the alliance’s top nine threats to the cloud at a Trend Micro event in Sydney.
By Hamish Barwick | 19 May, 2015 15:34
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says.
By Ellen Messmer | 16 January, 2014 05:20
Cloud-based services are still often seen as too risky for sensitive information. Take the case at Kingsport, Tenn.-based Eastman Chemical Company, which said "no" to the cloud when designing its new crisis communications system.
By Ellen Messmer | 02 January, 2014 19:12
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem.
By Ellen Messmer | 10 December, 2013 23:18
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
By Ellen Messmer | 06 December, 2013 15:28
The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud.
By Jaikumar Vijayan | 01 January, 2014 00:58
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
By Patrick Thibodeau | 26 August, 2013 10:10
This report showcases the results from a Computerworld survey across IT managers and CIOs on their organisation’s use and intentions around data backup and recovery processes. Find out: how IT leaders are changing the way they protect their organisation’s valuable information, the most popular uses and intentions around data backup practices and how organisations are dealing with exponential data growth.
When implementing a new BYO program, you might need to modify existing policies and create new user agreements that help obtain employee acceptance of new policies. This whitepaper looks at the best practices for creating these policies that can help you construct your own successful user agreement for Desktop Workspace or another BYO solution.
- Uber throws in the towel in battle with French taxi drivers
- As Windows 7 breaks the 1B-device mark, Microsoft's challenge will be to force it back to zero
- Android phone vendors should improve update policies, consumer organization says
- Five smartphones to look forward to
- Ad fraud Trojan updates Flash Player so that other malware can't get in
- The Upload: Your tech news briefing for Friday, July 3
- Cisco leaves key to all its Unified CDM systems under doormat
- IT firms' cloud appetite strong as gear sales surge 25 percent
- Samsung faces lawsuit in China over bloatware on phones
- Reddit sections go dark after exit of staffer
- Android ransomware on the rise in Australia
- Microsoft buries hatchet with Kyocera, ending litigation
- Plex hacker demands Bitcoin ransom for return of data
- Hands-on: Windows 10's latest build feels close to finished
- In Pictures: 7 things we hate about Twitter