Please turn on your JavaScript for this page to function normally.
Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

GFI Cloud gets remote control and screen sharing

GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company’s IT platform for SMBs. GFI …

How the cloud can be used and misused

Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, …

Estimating the cost of a cloud data breach

IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …

IBM eliminates fraudulent behavior in the cloud

IBM has patented a technique that helps online and cloud-based businesses improve their ability to eliminate fraud by analyzing browsing behavior to determine whether …

The cloud will transform the airport experience

Airports are increasingly identifying the need to switch to cloud systems in order to improve operational efficiencies, according to Amadeus, who collected the viewpoints of …

Small businesses and the cloud: How to mitigate the risks

Security concerns are still preventing many small businesses from using new technology methods to accelerate growth. The cloud is one major example of a “hot …

Trust in the U.S. cloud on the decline

Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …

Hybrid cloud computing success factors

In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …

Cloud optimism outweighs surveillance and breach concerns

With the one year anniversary of the PRISM revelations approaching, CipherCloud gauged the attitudes and insights of attendees at Infosecurity Europe 2014. In light of EU …

Key trends in cloud usage, risks and malware

Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …

Calling the cloud: Challenges of managing information

The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …

Don't miss

Cybersecurity news