A group of experts appointed by European Commission will scrutinize how European cloud computing contracts are established. It will also try to develop a standard contract. The European Commission launched a call for applications to recruit people from the industry, academia and other profiles, to establish a group of experts whose mission is to create…

Windows Azure is the platform used by application developers to create cloud based applications. As it turns out, more than 50 percent of firms in the global Fortune 500 are already using the Windows Azure cloud services. Microsoft noted that the expansion of client coverage coincides with the growth of the market of cloud computing….

SMEs are increasingly dominating the market for security applications. New threats and BYOD let companies invest in their security. The turnover in the market for security software is therefore grown last year by about eight percent. Gartner reported the turnover of the global market for security software grew last year by 7.9 percent to $19.2…

by Erik Grueter What if your software could detect when it was under attack? What if files reported when, where and by whom they were opened? Intelligent digital assets are behind an agile new security style called Information Based Security.  Developed in response to an increased use of file sharing services, personal devices, and niche business applications….

Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it’s not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information,…

Cloud Security Alliance (CSA), a non-profit industry organization that promotes the protection techniques in the cloud, has recently updated its list of the top threats of cloud in the report entitled “The Notorious Nine Cloud Computing Top Threats in 2013”. CSA indicates that the report reflects the consensus of the experts on the most significant…

Traders and users who want to use cloud, smartphones and tablets as mobile payment devices card processing should be cautious and wait for the availability of greater protection techniques. It is a recommendation of the PCI Security Standards Council, which considers that, in its current stage, these systems introduce new security challenges. The PCI Security…

Despite the many advantages provided by cloud computing technology, the rate of adoption among large enterprises has been surprisingly slow, especially when compared to the way SMEs have embraced the technology. The main reason for the slow rate of adoption is the fact that migrating to the cloud would generally require the discarding of many…

Around the world, Internet users are beginning to tire of giving their personal data on the Internet and the big data information collected and monetized is headed for a clash with privacy concerns. According to tech analyst firm Ovum, netizens around the world begin to realize the amount of personal data collected. The survey conducted…

The security landscape is undergoing profound changes. There has been advanced attacks, widespread fraud with the growing use of social media, mobility and cloud. While companies must manage growing volume of data, how the data should be protected when business is changing rapidly is the real concerns. To help detect stealth threats that can be…