It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
Showing results 1 to 20 of 2,396
The Online Trust Alliance says that a high percentage of data breaches were the result of staff mistakes -- rather than external hacking.
One in four enterprises employs DevOps,and it's making a difference in software delivery. Data security is a concern, however.
Distibuted Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Ahead of the State of the Union later this month, the president's proposed laws aim to force companies to disclose hacks and breaches inside a month.
The FBI's chief says hackers responsible for Sony's data breach "got sloppy," which enabled forensics teams to unmask the culpable country.
Sponsored by Red Hat and Intel
Many enterprises have commenced deployment of hybrid cloud models, receiving the dual benefits of public cloud offloading of infrastructure concerns and private cloud safeguarding of data.
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
Managing the complexity of virtual desktop infrastructure can be a major part of realizing any savings an organization might see. Alabama College of Osteopathic Medicine selected tools from Unidesk. One of its staff explains why.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Non-HTTPS pages provide no data security and the user should be reminded of that, argues the company. It's a big step.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
Australia's leading national security and intelligence agencies will not reveal the communications data they want retained by telecommunications companies until discussions with those companies have concluded.
The Queensland Department of Health is working to patch what it is calling a 'computer infrastructure issue' that has affected the department's central data service centre, which is hooked into the state's hospital network.
Hitachi Data Systems has predicted that in 2015, the market will see enterprises deploy their critical legacy applications into a hybrid cloud infrastructure.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The National Security Agency has released a new open-source program for data network interoperability.