Protection of consumer data in the cloud features highly in the Australian Computer Society’s (ACS’s) call for submissions on the federal government-backed Consumer Cloud Protocol (CCP).
Browsing: Strategy and Planning
While the majority of CISOs may profess a commitment to managing security based on risk management principles, the truth about how they execute on those principles may be a lot more imperfect.
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust.
The UK Home Office has launched a new £4m information security awareness campaign, designed to educate businesses and consumers about rising hacker threats. The first stage of the campaign is due to get underway in the autumn.
A parliamentary inquiry has recommended that any data retention laws should include provisions to protect privacy and provide oversight.
Today SafeNet, Inc., a global leader in information security, launched its Trusted Cloud Fabric™, a practical framework designed to deliver the trust, security, and compliance enterprises demand when moving data, applications and systems to the cloud.
File synchronisation services like Dropbox, Skydrive, iCloud and Ubuntu One are being increasingly used in organisations. The services themselves provide convenience and are often more secure than alternatives like email and FTP.
India is preparing to roll out a new cyber-security system, amid reports it was among the top five countries compromised by US surveillance.
The Gartner Security & Risk Management Summit is the premier conference and meeting place for IT and business executives responsible for creating, implementing and managing a proactive and comprehensive strategy for information security, risk management, governance, business continuity management and business resiliency.