GitHub token scanning comes to Alibaba, AWS, Azure, Google and more
GitHub's token scanning service now scans tokens issued by most major cloud providers.
GitHub's token scanning service now scans tokens issued by most major cloud providers.
Supermicro says audit found absolutely no evidence spy hardware on its motherboards.
Uber comes clean on UK users affected by its breach, but it's yet to reveal details about users in other countries.
ABC IT admins should probably have checked the AWS S3 Console for warnings that S3 buckets were publicly available.
AWS's S3 Console now contains "public" labels that aim to make it harder to miss that an S3 bucket has been made publicly available.
Basic DDoS protection will soon be a given for apps run on AWS and Azure infrastructure, but intel will cost more.
AWS has launched Macie to help customers classify data and protect it from accidental leaks and intentional hacks.
Compiling a compliance report for auditors might not be the most thrilling task in security, but it’s still necessary to show that security controls meet key standards, such as ISO 27001, payment card industry (PCI) requirements, and Service Organization Control (SOC).
Ashton Kutcher is best known as an actor and producer, but he is also a successful tech investor having taken stakes in companies such as Airbnb, Foursquare, Meerkat, Spotify and Uber.
Stephen Withers | 08 Nov | Read more
As Joomla websites were being attacked en masse using recently patched exploits and owners of Belkin WeMo devices were advised to update before their devices were exploited in global zombie botnets, some were wondering whether developers will ever get better at writing secure code.
David Braue | 08 Nov | Read more
Hackers ply every angle possible to turn up a software flaw on desktops and new research shows they’re also looking for unique differences in the way organizations configure services deployed on public cloud infrastructure, such as Amazon Web Services and Microsoft’s Azure.
Tips from KPMG on how New Zealand organisations can prepare for the next stage of cloud computing.
Divina Paredes | 26 Aug | Read more
Three vendors, including Microsoft and Amazon Web Services, have won a key U.S. government authorization that will allow federal agencies to put highly sensitive data on the cloud-computing services.
Grant Gross | 24 Jun | Read more
Secure-storage vendor CTERA Networks has dipped into the arsenal of military encryption and access-control methods to target its on-premises and public cloud storage to high-end organisations for whom conventional methods of authentication are proving to be inadequate.
David Braue | 14 Jun | Read more
Growing recognition of the need to expand understanding of device and user identity made this “the right time” to open an Australia-New Zealand focused data centre in Sydney, Ping Identity chief technology officer Patrick Harding has explained as the company steels itself for surging demand and a potential security “break down” as the Internet of Things (IoT) takes hold.
David Braue | 08 Apr | Read more