A study from the Lockheed Martin and its Cyber Security Alliance partners found that 85 percent of federal technology leaders and decision makers consider cyber security as a top most priority for Federal verticals, followed to a lesser degree by mobile computing (39%), cloud computing (26%) and big data (27%). The results of a collaborative…

IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing. Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result…

More companies now use cloud technologies to reap the benefits, such as lower cost, higher efficiency and more flexibility. Often, however, lacks the understanding of security and privacy policies of their own systems and industry-specific regulations or legal framework. To allow companies to test their cloud security knowledge, Microsoft allows companies to check whether they…

The findings of a survey conducted jointly by Cloud Security Alliance (CSA) and ISACA show that government regulations, exit strategies and international data privacy dominate the top 10 areas where trust in the cloud is the lowest. Studying Cloud Market Maturity conducted jointly between ISACA and CSA provides business leaders and IT knowledge on the…

Having reaffirmed in June the need for structural reform of the digital economy, the EU executive last week presented its proposals to “Unlock the potential of cloud computing in Europe”. This is to encourage more governments and companies from all sectors to adopt solutions dedicated to cloud computing. Europe wants coordinated action in the field…

TechSoup in partnership with TechSoup Global Network conducted its 2012 Global Cloud Computing Survey among 10,500 nonprofits, charities, and non-governmental organizations (NGOs) from 88 countries on the use of technology hosted in the cloud at nonprofit organizations. The objective of the survey was to determine the current state of the technological equipment of these organizations…

The Cloud Security Alliance (CSA) announced the creation of a Privacy Level Agreement (PLA) Working Group in the EU chaired by the Hong Kong Applied Science and Technology Research Institute (ASTRI), to seek solutions to improve the security, development of cloud systems that respond to the challenges of cloud development in Hong Kong. The possibilities…

The digital economy is experiencing rapid growth driven by broadband penetration; parallel computing power and storage capacity continue to grow. These developments contribute to the emergence of global markets content for the benefit of rights holders, but also create a new threat – copyright, which could seriously harm the creative industries. The intellectual property rights…

The Ponemon Institute published a study on the global use of encryption of sensitive data by users in the cloud. Beyond the results, the document also provides an interesting perspective on the perception of cloud and security by companies from different countries. The study conducted by Ponemon Institute in association with computer security specialist Thales…