Stories by David Braue

Utilities ignorant of IT security despite pounding by hackers: Ponemon

By David Braue | 30 July, 2014 14:58

Security pundits have warned of the imminent hacking threat to critical infrastructure providers, but a new Ponemon Institute survey of infrastructure operators suggests the threat is already here.

Next-gen firewalls protect crews in concert at Melbourne and Olympic Parks

By David Braue | 30 July, 2014 14:42

A furiously busy event schedule and an expanding range of facilities keeps the IT team at Melbourne and Olympic Parks (MOP) occupied – not only delivering discrete network services to visiting production crews for acts like Queen and Adam Lambert, but also providing the security infrastructure to ensure that those customers can connect both safely and reliably.

Airline tickets the most popular purchase for credit-card scammers: RSA

By David Braue | 30 July, 2014 14:38

Airlines accounted for 39 per cent of e-commerce transactions secured by security firm RSA last year but suffered 46 per cent of known purchasing fraud, analysis of data from the company's risk-based authentication system has revealed.

Mobile-loving Aussies open targets for Koler malware: Kaspersky

By David Braue | 29 July, 2014 14:44

Australians are the third most-frequent victims of a new infection vector for 'Koler' ransomware, which emerged in April and was targeting both mobile and PC users with 'Australianised' content until it began uninstalling itself from infected mobiles this week.

Despite shocks, organisations still not making security a continuous process: Bussiere

By David Braue | 29 July, 2014 09:58

The ongoing spate of high-profile data thefts is spurring companies to action but much of it is still reactionary and short-lived due to a lack of technical understanding about the security technologies now available on the market, according to one security industry architect.

Analysis skills lacking as security data piles up, consultant warns

By David Braue | 29 July, 2014 09:57

Organisations are able to collect more data about security breaches than ever but face an ironic challenge because most still lack the skills to effectively interpret and act upon that data, a security consultant has warned.

CIOs, CSOs should address cloud sovereignty uncertainty with facts: Gartner

By David Braue | 28 July, 2014 16:15 | 2 Comments

IT and security leaders should arm themselves with details about the location of their corporate data and use a growing comfort with cloud computing to address policy concerns about data sovereignty, a recent Gartner analysis has recommended.

The week in security: Hackers swarm banks, break for World Cup

By David Braue | 28 July, 2014 16:06

It seems even cybercriminals love their soccer, with statistics suggesting]] that the volumes of online attacks almost stopped during the nailbiting grand final this month. Yet others were up to their usual tricks, with a Wordpress plugin targeted and still others ransoming the European Central Bank after stealing user contact information.

Adelaide security researcher nurturing students' love of a good hack

By David Braue | 23 July, 2014 23:15

A group of nearly 100 University of Adelaide computer science students is beginning their third day in a computer-security intensive program that was co-ordinated by a School of Computer Science security researcher and PhD candidate.

Imperva security stats confirm even hackers love a World Cup thriller

By David Braue | 22 July, 2014 15:34

The 2014 World Cup soccer grand final between Germany and Argentina was so popular around the world that even hackers took time off from their depredations to watch, a traffic analysis from Imperva has revealed.

With walls breached, document protection is the new security imperative

By David Braue | 22 July, 2014 10:00

Whether driven by hackers becoming more aggressive, or by new regulations increasing visibility around an ongoing problem, growing reports of data theft are prompting organisations to take urgent and proactive measures to protect business documents during every stage of their life cycle.

The week in security: Password managers, IT managers under fire over security disconnect

By David Braue | 21 July, 2014 14:54

Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.

Security industry co-operation gains primacy as Palo Alto goes to Aruba

By David Braue | 18 July, 2014 14:43

A Palo Alto Networks and Aruba Networks partnership to integrate security products reflects a growing trend towards security industry co-operation and threat information sharing, the firms' local heads have confirmed.

Aussie CSOs questioning tech value, rarely talk security with executives: Ponemon

By David Braue | 18 July, 2014 14:35

Fully one-third of Australian cyber-security teams never speak with their company's executive team about security threats and a further 22 percent only meet once a year to discuss security, according to a new Ponemon Institute survey that has found fully a third of respondents would completely overhaul their IT security infrastructure if they could.

Tassie startup StratoKey headed to security stratosphere

By David Braue | 17 July, 2014 09:18

After nearly three years in development, the May debut of Tasmanian startup company's StratoKey security tool has been rewarded with a finalist berth in upcoming awards from security giant RSA and the opportunity for the founders to present to a massive audience of regional security-industry figures.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get Powerful Protection for All of Your Mobile Devices

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.