- Staff breach at OneLogin exposes password storage feature
- The Dropbox data breach is a warning to update passwords
- Adobe patches critical vulnerability in ColdFusion application server
- Crooks are selling a skimmer that works on all chip card readers
- Dropbox changed passwords after 68M accounts were compromised
Five Challenges to Continuous PCI DSS Compliance
This white paper discusses the major challenges when navigating the PCI compliance landscape, along with their implications. It also provides a plan of action that organisations can take to address compliance needs. Read on.
Digital transformation is vital for business growth, but working out what to do and how to do it remains difficult for IT and business leaders. Gartner can help with its latest predictions for key aspects of the IT world, which highlight, among other things, the importance of business algorithms. Download whitepaper »
Today’s enterprises have higher than ever demands for data and application availability. The rapid digitisation of business processes and increasing expectations from customers and partners for constant uptime is ushering in a new era for IT which is less restricted by manual data protection practices. Telsyte research shows 75 per cent of IT budgets are spent on operations and transformation programs with only 25 per cent left for innovation. To drive more innovation, CIOs must address their number one business priority — reducing operating expenses — and free their organisations from a complex collection of backup, storage and virtualisation systems to ensure applications are online and protected from failures and cyber attacks. Download whitepaper »
Application availability is the name of the game for IT organisations. IDC research has determined that application downtime costs exceeding $100,000 per hour is the median, although that cost can run substantially higher for some organisations. Consequently, organisations are willing to invest considerable sums in availability solutions that avoid downtime and ensure smooth business operations. Download whitepaper »
- The Future is Encrypted. What's your defense?
- The Future is Encrypted. Manage It.
- See Your Traffic for What It Really Is
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- Check your Future Risk
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- Digital chief and data key to City of Sydney's community approach, says Forster
- How data insight is helping transform Cure Brain Cancer Foundation's marketing and comms
- GroupM goes for 100% viewability with Twitter ad campaign trials
- A day in the working life of tomorrow’s marketer
- After bias furor, Facebook replaces people with algorithms