Top Security Researcher Explains How to Crash Telco Networks in the Cloud
Karsten Nohl showed how cloud vulnerabilities could let hackers progress from spying on messages to taking down entire networks.
Karsten Nohl showed how cloud vulnerabilities could let hackers progress from spying on messages to taking down entire networks.
Matthew Gamble of the Internet Society Canada Chapter published the full text of his damning presentation at RAG New Orleans.
An exploration of how the cloud has changed the way businesses approach data integration and transformation.
Combining analytics with software as a service led to an explosion in the number of disparate data repositories maintained by companies.
Some of the grand claims made for South Africa’s draft National Policy on Data and the Cloud make little sense in a world where data easily crosses borders.
Insurance firms Allianz and Munich Re will base cybersecurity premiums on information obtained directly from Google.
Mike Willett, EY Partner and former Telstra RAFM Director, explains how to get more from the analysis of data.
ETSI standard TS 103 457 could be used to limit access to sensitive network functions running on public clouds.
Maciej Szpunar of the CJEU advised that cloud-based TV recording is equivalent to using a video recorder in the home.
If the purpose of press releases is to succinctly and effectively communicate important news then somebody needs to give that advice to the people writing the press releases.