Please turn on your JavaScript for this page to function normally.
63.7% of organisations plan a cloud investment this year

Only 36.3% of organizations are not planning any cloud investment, suggesting that previous fears of moving into the cloud may have abated, according to Ipswitch. Cloud …

Cloud operating system for public, private and hybrid clouds

Joyent released SmartDataCenter 6, the newest version of its cloud operating system, an integrated suite of software and services designed for service providers and …

Global workforce and the cloud

Every couple of years (ISC)2 issue a report on the current situation and future expectations regarding the global information security workforce. At the Infosecurity press …

Chinese Trojan targets cloud-based AV technologies

A Trojan that tries to obstruct cloud-based antivirus technology present in major AV solutions offered by Chinese security firms is targeting users by posing as a video player …

40% of executives not planning to adopt the cloud

Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to a report by ISACA. Respondents who do not plan to use cloud …

Security professionals focus on cloud computing skills

Information security professionals may be focusing on familiar territory rather than new paradigms when it comes to skilling up for the cloud, suggest early survey results …

Managed Wi-Fi access and PCI scanning in a single device

AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …

The security landscape from 2010 to 2011

Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …

Cloud Controls Matrix 1.1 released

The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …

Underground toolkits will make cyber espionage easy

With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …

Nessus in the cloud

The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …

Cisco estimates huge shift to the cloud by 2013

Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …

Don't miss

Cybersecurity news