The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
Investments from network operators Telstra, Telefónica and others will help fuel Box's international expansion.
IT managers want to cut the number of servers they manage, or at least slow the growth, and they may be succeeding, according to new data.
In a major move for data portability, Google will let users download their entire set of Gmail messages in a single file and do the same with their Google Calendar items.
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
It's been another busy year in the enterprise software industry, marked by high-profile acquisitions and IPOs, the rise of in-memory computing, a red-hot HCM (human capital management) market, and even the apparent settling of a long-running Silicon Valley feud. Here's a look at some of the highlights.
SlideShare, a site for posting, sharing, viewing, rating and commenting primarily on business presentations, has given a makeover to its homepage.
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat.
Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June.
Sign up now »
It’s high time we tamed the monster we created! Against a backdrop of sustained and uncontrollable data growth, most of today’s operational problems revolve around backup and recovery. Understanding the ...
Enterprises, both small and big, are evaluating cloud computing and, in increasing numbers, are moving their IT infrastructure ...
"The most complex IT projects can be managed all right provided you ..."
Why IT projects really fail
"Yay, good news for the smart state."
Queensland government to provide 200 services online by 2015
"Great article, and it confirms what we see in call centers across ..."
Call Centers Suffer From Big Data Overload
"So why are people flocking to GumTree?"
CIO 100: Carsales wins top gong for innovation
"A much easier solution is to use LastPass. You will only have ..."
How to secure passwords and other critical numbers
- Study finds zero-day vulnerabilities abound in popular software
- Data breaches have eroded consumer faith in security, Fujitsu finds
- New website lets users check if their online credentials were exposed in large data leaks
- Conventional insurance may not cover cyber security breaches: Centre for Internet Safety
- JP Morgan suffers cyber attack, 465,000 card customer details stolen
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest