Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings.
Browsing: CISO
The benefits of adopting cloud technologies have been widely reported and are commonly understood. However, cloud brings with it many questions and concerns about jurisdictional and regulatory control over the privacy and protection of sensitive data.
The Odisha Government has decided to designate Additional Director General of Police (Crime) as the Chief Information Security Officer (CISO) of the State.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Protection of consumer data in the cloud features highly in the Australian Computer Society’s (ACS’s) call for submissions on the federal government-backed Consumer Cloud Protocol (CCP).
While the majority of CISOs may profess a commitment to managing security based on risk management principles, the truth about how they execute on those principles may be a lot more imperfect.
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust.
The UK Home Office has launched a new £4m information security awareness campaign, designed to educate businesses and consumers about rising hacker threats. The first stage of the campaign is due to get underway in the autumn.
File synchronisation services like Dropbox, Skydrive, iCloud and Ubuntu One are being increasingly used in organisations. The services themselves provide convenience and are often more secure than alternatives like email and FTP.
India is preparing to roll out a new cyber-security system, amid reports it was among the top five countries compromised by US surveillance.