Please turn on your JavaScript for this page to function normally.
Financial data stealing malware on the Amazon cloud

There were some recent comments about Amazon Cloud as a platform for successful attacks on Sony. Now Amazon Web Services (cloud) now are being used to spread financial data …

Data center IT departments fear targeted attacks

IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …

Code in the Cloud: Programming Google AppEngine

Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …

The evolution of traditional desktops into personal clouds

As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …

Best practices to reduce risk in cloud contracts

IT procurement or sourcing managers challenged with finding sourcing options that reduce costs at tolerable risks should examine nine contractual terms to reduce risk in cloud …

nCircle debuts PureCloud security scanning technology

nCircle announced in collaboration with HITRUST the debut of PureCloud, a security scanning technology, and the integration of PureCloud into the HITRUST CSF Assessment for …

Microsoft Forefront Endpoint Protection 2012 Beta released

Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …

VMware acquires Shavlik Technologies

VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …

PC Lock protects from identity theft, privacy invasion

Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …

PSN attackers allegedly used Amazon cloud for attack

Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …

Five ways to migrate applications to the cloud

Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …

Chromebook: A new class of risks

We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …

Don't miss

Cybersecurity news