Business Continuity

News

The week in security: Target PCI DSS auditor sued, XP-ocalypse nears

By David Braue | 01 April, 2014 21:19

Recriminations were flying as security vendor Trustwave Holdings was named in a lawsuit related to the penetration of US retailer Target, in a suit related to Target's obligations under the PCI DSS credit-card industry standard. The move was termed a wake up call for companies looking to hire PCI DSS auditors, while others in the credit-card industry were seizing on the Target hack to further their arguments for PIN vs chip-based card security.

Why aren’t we winning the security battle?

By Anthony Caruana | 31 March, 2014 22:12

Given the billions of dollars that have been invested in security over the last decade or so, you'd expect that malware distributors and data thieves to be scurrying away with their tails between their legs. But that's simply not the case.

Australians lag world in backup, still losing data: Kroll

By David Braue | 31 March, 2014 14:52 | 1 Comment

March 31 is World Backup Day; do you know where your data is?

Pwn2Own – Incentivised Hacking

By Anthony Caruana | 15 March, 2014 22:02

HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.

A Brief Guide to the ICT Security Controls Required by the Australian Privacy Principles

By Ashwin Pal | 11 March, 2014 12:16

The Privacy Amendment Act 2012 (No. 197, 2012), has passed through the Australian Parliament and took effect on 12 March 2014.

Reviews

Storing in the cloud securely: 30 services compared

By Ashton Mills | 20 June, 2012 14:04 | 10 Comments

In perhaps the most comprehensive roundup on the net, we take a look at cloud storage services for personal and business use from the perspective of the CIO: what they offer, what's important and what to look for.

Review: Self-Encrypting External Hard Disk Drives

By Enex Testlab | 16 October, 2011 17:33

With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.

Trend Micro SafeSync online data backup service (50GB)

By Elias Plastiras | 29 June, 2011 16:05

Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.

Slideshows

Recoup with data dedupe

By Logan Harbaugh | 13 September, 2011 21:24

8 products that can help cut your storage costs through data duplication

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

By Jane Treadwell | 14 July, 2011 21:53

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Opinions

Opinion: Use It, Don’t Lose It: Keeping Your Business Data Safe

By CSO staff | 13 September, 2011 10:20

Some things are meant to go together. Coffee and laptops isn’t one of them. Spilling a drink on a keyboard is just one of many ways people lose vital business data. Other hazards include hardware and software failure, viruses, accidentally deleting a file, fire and theft. Yet more than one in three Australian businesses (36%) do not have an offsite backup strategy to protect their data, according to a survey* by backup specialist Acronis.

Opinion: Business Security - Securing your business data

By Ian Hyndman | 13 July, 2011 12:47

This is not just what is stolen; but also the loss of business or credibility that comes from informing customers that their data has been compromised. How would your customers react if you told them that their financial data or personal information had been taken by persons unknown?

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get Powerful Protection for All of Your Mobile Devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.