CSO Webinar: Putting your data somewhere safe is one thing – but can you get it back when you need it?
Today’s businesses are producing so much data that a core part of IT strategy is just finding somewhere to store it.
Today’s businesses are producing so much data that a core part of IT strategy is just finding somewhere to store it.
Although just 1 in 3 Australian companies believe they need to be compliant with forthcoming European Union privacy regulations, the remainder are likely to find themselves commercially disadvantaged if they don’t do the same, a senior European cloud-industry executive has warned.
David Braue | 22 Aug | Read more
Australian targets are being hit by shorter, more intense distributed denial of service (DDoS) attacks that are, on average, the largest in the Asia-Pacific region, according to new figures from a global DDoS watchdog.
David Braue | 17 Apr | Read more
Malware intentionally created by the U.S. National Security Agency to infect personal computer hard disk drives (HDDs) and solid-state drives (SSDs) cannot be detected by antivirus programs.
Lucas Mearian | 19 Feb | Read more
Although there's obviously a significant interest in privacy from a legal and compliance perspective, Vodafone's head of privacy, Stephen Deadman, told the audience at the recent IAPP Summit that there's an increasing focus on economics.
Anthony Caruana | 20 Nov | Read more
Smart meters have a way to go. The recent 2010 Australian Smart Grid Study, a survey of 13 Australian utilities by sector consultancy Logica, showed an average self-reported maturity rating of just 2.14 on a scale of 1 to 5, and communications networks to support them rated 2.80.
David Braue | 03 May | Read more
Enterprises don't like to discuss how often backups fail to take place, restorations prove unsuccessful and damaged media ships out for data recovery.
Jennifer Kavur | 12 Mar | Read more
While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!