This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Cloud

ICYMI: 'Banksy' sketches GCHQ, Heartbleed rumours & cloud confusion

ICYMI: 'Banksy' sketches GCHQ, Heartbleed rumours & cloud confusion

By

As another week in information security zips by, we look at the top stories in our weekly In Case You Missed It (ICYMI) column.

1 in 3 businesses swerve cloud due to government snooping

1 in 3 businesses swerve cloud due to government snooping

By

A new report released today claims that the rising level of government surveillance is now driving a third of organisations away from using cloud computing.

RSA 2014: RedOwl Analytics named "Most Innovative Company" at Innovation Sandbox

By

Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.

SC Awards Europe 2014 finalists announced

SC Awards Europe 2014 finalists announced

By

The finalists for this year's SC Awards Europe 2014 have now been shortlisted.

SC Awards Europe 2014: The first finalists announced

SC Awards Europe 2014: The first finalists announced

By

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for grabs...

Why businesses fear the cloud

Why businesses fear the cloud

Cloud storage will be a hacking magnet suggests David Emm, with the most vulnerable point of entry for attackers being staff.

What security level is appropriate in the cloud?

What security level is appropriate in the cloud?

Selecting an appropriate cloud security solution can be simplified by ensuring cloud providers offer different environments with appropriate controls that align with actual risks faced suggests John Godwin

Safeguarding data in the cloud

Access controls, encryption and more all must be considered, along with just who and how corporate data is exposed. We explore some of the more critical security issues executives must consider when relying on the cloud.

Potentially major XSS/JavaScript flaw found in Office 365

Potentially major XSS/JavaScript flaw found in Office 365

By

Microsoft Office 365's security outlook: cloudy

Cyber criminals tap the cloud for malware hosting

Cyber criminals tap the cloud for malware hosting

By

"Using the cloud for cyber-criminal resources means that it's now possible to control your darkware empire from a single laptop"

Careless staff beats theft and malware as biggest CISO fear

Careless staff beats theft and malware as biggest CISO fear

By

Careless employees are the biggest security concern for IT professionals, research shows, prompting calls for CISOs to step up staff education and the use of technology.

Gamers trust tested as hidden Trojan attacks World of Warcraft players

Gamers trust tested as hidden Trojan attacks World of Warcraft players

By

A malicious Trojan is infecting World of Warcraft accounts and testing gamers trust to the brink.

Five threats to watch out for in 2014

Five threats to watch out for in 2014

By

Leading pen tester reveals his main security concerns for the next 12 months

Top 10 issues in IT security for 2014

Top 10 issues in IT security for 2014

By

From banking hacks and malicious mobile apps to insider leaks and a serious data breach each month, 2014 promises to a challenging year for CISOs.

Can the cloud be secure?

Can the cloud be secure?

Blaming cloud providers for giving in to the demands of US intelligence is a naive approach to a complex issue.

Out of site, but in mind

Out of site, but in mind

Services abound for business continuity and disaster recovery in the cloud, but what's the right choice for your organisation? Alan Earls investigates the options.

Euro-cloud 'all hot air'

By

UK cloud vendors reject calls for a 'secure' European cloud in the wake of Prism surveillance revelations.

ID verification simplifies cloud access

By

Philip Turner, the newly appointed GM for European Operations at US-based identity management specialists Okta, told SC Magazine that opening of its central London office is spearheading international expansion, with the company expected to open offices in the main European centres over the coming year.

Palo Alto Networks launches private cloud appliance for better detection of APTs

By

Palo Alto Networks has announced the launch of the WildFire WF-500 appliance that it aims will deliver a private cloud solution for timely and thorough detection, analysis and prevention of advanced persistent threats (APTs).

Forrester forum predicts future of cloud delivery and end of central IT

Forrester forum predicts future of cloud delivery and end of central IT

By

In seven years the information security industry will see more cloud delivery and no central IT.

Online Ownership

Online Ownership

By

The cloud has been a somewhat nebulous concept for a few years.

GFI Software adds patch management to cloud offering

By

GFI Software has added a patch management capability to its GFI Cloud offering.

How to secure the virtual world

How to secure the virtual world

By

Cloud computing has been taking the IT world by storm - according to recent figures from Gartner, the industry grew by nearly 20 per cent globally last year.

SC Cyber Security Day: Key threat trends identified

SC Cyber Security Day: Key threat trends identified

By

A security program should begin with IT and business people getting round a table and 'talking, and talking more'.

CSIT Summit: Secure cloud and infrastructure today as tomorrow demands it

CSIT Summit: Secure cloud and infrastructure today as tomorrow demands it

By

The internet of things is about more than connected machines, it is about secure technology and connectivity.

Evernote - a story that has combined all security trends?

Evernote - a story that has combined all security trends?

By

The attack on Evernote that was reported last weekend could be deemed to be a new stage in the battle of man v password.

SaaSID adds new capability to its Cloud Application Manager

By

SaaSID has launched the second version of its cloud application manager to offer a unified format for managing user's authentication credentials.

Combining cloud-based DDoS protection and managed DNS services to thwart large attacks

Combining cloud-based DDoS protection and managed DNS services to thwart large attacks

By

As businesses continue to move critical operations online, distributed denial of service (DDoS) attacks are increasing in frequency, sophistication and range of targets.

Government intervention scares users from using the cloud

Government intervention scares users from using the cloud

By

A fear of government snooping is deterring IT departments from using the cloud.

MegaCracker tool could reveal Mega passwords

MegaCracker tool could reveal Mega passwords

By

Following the launch of the Mega cloud service at the start of this week, a security researcher has found a cryptographic flaw in it that could reveal user passwords.

Newsletters