TAVUU gives you full control of your encryption keys and, thus, your data. We will not ask you to create an account or to login on...
Showing results 1 to 20 of 2,272
It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
One in four enterprises employs DevOps,and it's making a difference in software delivery. Data security is a concern, however.
Ahead of the State of the Union later this month, the president's proposed laws aim to force companies to disclose hacks and breaches inside a month.
The FBI's chief says hackers responsible for Sony's data breach "got sloppy," which enabled forensics teams to unmask the culpable country.
Today's smartphones and tablets offer computing power, memory and storage that surpass that offered by mainframe computers in the 1990s. But security remains an ongoing challenge.
Nero BackItUp offers 4x local automatic backup (to hard disks, external storage, CD/DVD/Blu-ray and NAS) and your very own personal...
Flash arrays are gaining momentum in the data center and technology buyers need to ponder a storage system swap when older gear is retired.
The idea of virtualizing a function and then separating its management functions and them putting them under programmatic control has gotten quite a bit of attention in the market over the last year. We've heard about software defined networks, storage, and even whole data centers. Is support of only x86-based systems and their workloads enough?
This software offers a solution to users who want to password protect a USB drive. Simply select the drive to protect and the password...
Storage companies best known for providing memory cards for smartphones and cameras are increasingly using their scale and knowhow to come to a data center near you.
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
Jetstar passengers faced significant delays over the weekend in Australia following data storage issues at the budget airliner.
The pace of change continues to accelerate as Big Data, IoT and video create growing demand. New technologies are emerging while cloud storage erodes traditional business models.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Non-HTTPS pages provide no data security and the user should be reminded of that, argues the company. It's a big step.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
Australia's leading national security and intelligence agencies will not reveal the communications data they want retained by telecommunications companies until discussions with those companies have concluded.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The National Security Agency has released a new open-source program for data network interoperability.