Corporate Partners

Data Priacy News, Features, and Interviews

News

ISACA guides skills-challenged SMBs towards security governance

A new pair of manuals from peak security industry body ISACA is aiming to boost the information-security posture of small and medium-sized businesses (SMBs) by guiding the traditionally resource-challenged companies through the process of implementing a robust governance framework and then building a security framework on top of it.

David Braue | 29 May | Read more

The week in security: It's hack or be hacked as airplane rises, defences fall

Human expertise is becoming crucial to pick up the security chain where conventional antivirus solutions are dropping it, some argue as the overall online security threat increases and DDoS attacks get more sophisticated, by accounts. Yet even as Australia becomes the world's second most-attacked Web target and many companies perceive the value of security analytics in fighting DDoS and other attacks, the technology was the next to least actually-deployed security protection in one recent survey.

David Braue | 26 May | Read more

Computer Forensics Investigations: Body of Evidence

When the body of his wife was discovered, Air Force Sgt. Joseph Snodgrass was stationed at Clark Air Base in the Philippines. Julie Snodgrass was found in the cab of a pickup truck nearby, having been stabbed more than 42 times. The only evidence connecting her husband to the crime were a couple of floppy disks on which were stored two letters: one in which Sgt. Snodgrass asked his mistress to hire three hitmen to murder his wife, and another increasing his wife's life insurance coverage to $450,000. During questioning in his office by the Air Force Office of Special Investigations (OSI), Snodgrass pulled the two 5.25-inch diskettes from his desk and used pinking shears to chop the damning evidence into 2 dozen pieces.

Daintry Duffy | 01 May | Read more

More Data Priacy news

Reviews

The security suite guide 2010

Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk.

Frank J. Ohlhorst | 18 Aug | Read more

More Data Priacy reviews

Slideshows

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Data Priacy slideshows

Opinions

Proactive web security with client reputational services

In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.

Sudeep Charles | 27 Apr | Read more

The Active International Response to Cyber Crime

The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.

Mark Gregory | 26 Mar | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

More Data Priacy opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place