Stories by Ashton Mills

Review: Security firewall distributions

By Ashton Mills | 20 February, 2014 13:49

Firewalls underpin the security of any network, controlling the flow of data in and out. Where once they were simple in premise and execution, today they are just one component of a collection of services to monitor, track, limit and sometimes alter data to ensure the security of a network.

Endpoint Security Products: Part 1

By Ashton Mills | 21 October, 2013 09:00

In a sphere that changes as rapidly as security, it's no surprise that 'endpoint' as a definition is fluid. It is so new a sphere in the IT arsenal that not even the players who field endpoint products can agree on where the borders begin and end -- though naturally it encompasses their own core competency.

WatchGuard XTM 2520

By Ashton Mills | 28 August, 2013 14:16

If, as we are often led to believe, colour really is an indication of speed then the WatchGuard XTM 2520 would have to be the fastest hardware firewall solution on the planet. Or at least, in the rack.

Review: Linux Security Distributions

By Ashton Mills | 21 June, 2013 13:39

Where once Linux was relegated to long-bearded gurus sitting atop servers bathed in a the dull glow of fluorescent lighting, today it's much more hip and found in one form or another in most enterprises, even on the desktop, not to mention that it underpins the net as we know it today.

LANDesk Total User Management 9.5 Review

By Ashton Mills | 29 May, 2013 20:59 | 1 Comment

LANDesk’s foray into system, asset and user management is the latest version of its Total User Management suite, which we’ll affectionately call TUM.

Review: Mobile Device Management

By Ashton Mills | 20 May, 2013 13:36

With the rise of mobile computing -- first via laptops, then smartphones and now tablets -- the IT landscape changed within the enterprise. No more was IT just about the local network, WANs and security for desktops and servers: it now had to incorporate mobile devices, spanning all manner of manufacturers, operating systems, and platforms and to do so without compromising security. The sheer volume of devices and the different software they run is a natural antithesis to network security. Yet, these devices are integral to the way business works today, and so the IT department must adapt.

Review: Mobile Security

By Ashton Mills | 31 January, 2013 08:23 | 1 Comment

With mobile devices now ubiquitous in the workplace, you need to have some level of protection in place. Ashton Mills investigates.

Review: File Recovery Tools

By Ashton Mills | 28 November, 2012 13:35

We've previously covered a range of tools to securely delete data, but what if you want to recover data? Perhaps you want to make sure a secure deletion works as intended, or restore data written over on a portable USB, or perhaps you've been tasked with recovering critical business data on the boss’s hard drive before tomorrow's important meeting.

Review: Secure Flash Drives

By Ashton Mills | 13 September, 2012 09:00

USB flash drives are the modern floppy, albeit considerably larger and faster. They make our lives easy for taking data on the road, sharing with colleagues over sneakernet, and given their rapidly increasing size even acting as backup devices. They're also darn handy for installing software from ISO images.

Storing in the cloud securely: 30 services compared

By Ashton Mills | 20 June, 2012 14:04 | 10 Comments

In perhaps the most comprehensive roundup on the net, we take a look at cloud storage services for personal and business use from the perspective of the CIO: what they offer, what's important and what to look for.

Learning from Evolve.Cloud

By Ashton Mills | 04 May, 2012 17:11

Dave Asprey, VP Cloud Security at Trend Micro, talked at length about the changing landscape of mobile devices and the integration of consumer-based products into the workplace. Inevitably, he said, new consumer technology spreads to the office, where it can become a challenge for IT, particularly in relation to security.

Protecting your data: Cloud Security Alliance

By Ashton Mills | 04 May, 2012 09:59 | 4 Comments

At the Evolve.CLOUD conference in Sydney CSO sat down with Archie Reed, CTO Strategic Enterprise Services APAC and Japan for HP, to talk about the Cloud Security Alliance for which Reed is also a member. He outlined the global organisation's goals for standardising security in the cloud, education and certification, and what it means for companies looking to or making a transition to the cloud.

Is it time for the cloud?

By Ashton Mills | 03 May, 2012 13:04

Speaking at the Evolve.Cloud conference in Sydney, Vice President and Principal Analyst APAC at Forrester Research Group, Michael Barnes, explained how even if the cloud wasn't part of a company's IT, it will be in the near future, adding that the market is undergoing "unprecedented change" and companies will need to adapt.

Wipe it free: secure wiping software

By Ashton Mills | 03 April, 2012 10:24 | 2 Comments

When it comes retiring PCs at the office or at home, regardless of whether their final destination is a tip or to be sold to recover an investment, it goes without saying that a computer's drives need to be wiped. For the corporate environment, you're going to want to make sure no sensitive data is left behind however benign, and for the home you don't want leave any trace of personal details or credit card transactions that could be picked up and used in identify theft.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Fraud Management Solutions

Reduce fraud losses regardless of channel by preventing cybercrime, identity theft, and other threats targeting your customers.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.