Business Continuity News, Features, and Interviews

News

What does success mean when we are performing risk assessments

By Anthony Caruana | 27 August, 2014 14:31

During her presentation at the Gartner Security and Risk summit held in Sydney, Gartner Research Director, Anne Robins looked at the difference between successful risk assessments and unsuccessful assessments and what they mean for your business.

Symantec courting Australian security talent as Sydney facility opened

By David Braue | 27 August, 2014 13:20

Australia has a strong base of skilled security professionals to tap into, but a “dearth of security talent” will drive helped strengthen the case to invest heavily in the expansion of a Sydney facility that will form an increasingly important part of Symantec's global managed-security and security research capability.

The week in security: Healthcare breach prompts govt security response

By David Braue | 27 August, 2014 13:06

Tax giant H&R Block took a big step with the |implementation of a new staff-onboarding system that uses a secure identity framework to confirm identity, while US shipping company United Parcel Service (UPS) was trying to confirm some other identities after its UPS Store subsidiary was |hit with a security breach that saw malware loaded on systems in 51 stores.

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

By Brad Chacos | 22 August, 2014 08:12

It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

Using technology to reduce migration fraud

By Stephen Withers | 07 August, 2014 19:27

When you’re looking for a needle in a haystack, it helps if you can reduce the amount of hay you sort through.

Reviews

Storing in the cloud securely: 30 services compared

By Ashton Mills | 20 June, 2012 14:04 | 10 Comments

In perhaps the most comprehensive roundup on the net, we take a look at cloud storage services for personal and business use from the perspective of the CIO: what they offer, what's important and what to look for.

Review: Self-Encrypting External Hard Disk Drives

By Enex Testlab | 16 October, 2011 17:33

With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.

Trend Micro SafeSync online data backup service (50GB)

By Elias Plastiras | 29 June, 2011 16:05

Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.

Slideshows

Recoup with data dedupe

By Logan Harbaugh | 13 September, 2011 21:24

8 products that can help cut your storage costs through data duplication

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

By Jane Treadwell | 14 July, 2011 21:53

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Opinions

Opinion: Use It, Don’t Lose It: Keeping Your Business Data Safe

By CSO staff | 13 September, 2011 10:20

Some things are meant to go together. Coffee and laptops isn’t one of them. Spilling a drink on a keyboard is just one of many ways people lose vital business data. Other hazards include hardware and software failure, viruses, accidentally deleting a file, fire and theft. Yet more than one in three Australian businesses (36%) do not have an offsite backup strategy to protect their data, according to a survey* by backup specialist Acronis.

Opinion: Business Security - Securing your business data

By Ian Hyndman | 13 July, 2011 12:47

This is not just what is stolen; but also the loss of business or credibility that comes from informing customers that their data has been compromised. How would your customers react if you told them that their financial data or personal information had been taken by persons unknown?

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Security

Safeguard your corporate and roaming employee endpoints and mobile devices.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.