Data Protection — News

Forget BYOD – it's now BYOC

For the last couple of years CIOs and CSOs have been fighting to manage the rising tide of personal devices entering the enterprise. But that's changing as people start to bring their own cloud apps and services into the enterprise. BYOC – Bring your own Cloud – is the new challenge.

Anthony Caruana | 01 Apr | Read more

Security Driving SDN Uptake

Software Defined Networks are here. In just a couple of years they have moved from theory and are now part of every CIO's planning. And that means a significant rethink is needed when looking at security. With many critical functions moving off proprietary hardware towards open platforms where core functions are abstracted to software, the way networks are managed and secured is changing.

Anthony Caruana | 31 Mar | Read more

Australian government requests for Google user info up 29% in 2013

The Australian government increased its use of data requests to source information on Google by 29 per cent from 2012 to 2013, the company's latest Transparency Report has shown, while figures indicated that Australian authorities are proving more effective than most governments at getting most of the information they request.

David Braue | 31 Mar | Read more

Cisco dealing with change in the threat landscape

We've all heard the same story recently – malware developers and distributors are becoming far smarter and commercially minded than ever before. The days of disgruntled teenagers hacking from their dimly lit bedrooms are behind us with corporatised criminal gangs now working as organized syndicates intent on stealing identities and extorting money.

Anthony Caruana | 24 Mar | Read more

Pwn2Own – Incentivised Hacking

HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.

Anthony Caruana | 15 Mar | Read more

Bitcoin: Can digital currencies ever be secure?

Bitcoin, and the other crypto-currencies that are available, have garnered plenty of attention over the last year or so – and not all of that has been good. Some analysts have found strong correlations between the fluctuating exchange rate of Bitcoin and the activities of malware distributors and other nefarious actors. And the recent Mt Gox (a Bitcoin currency exchange) revelations that as much as half a billion dollars of Bitcoin had been stolen, rendering the company insolvent, have highlighted the volatility and transience of virtual currencies.

Anthony Caruana | 14 Mar | Read more

New tool finds PII hiding on corporate systems

The new Australian privacy legislation that came into effect on 12 March 2014 has increased the pressure on businesses to correctly collect, store, secure and dispose of Personally Identifiable Information. But does you business really know what information they are storing and where it is? Ground Labs has released Data Recon, a Personally Identifiable Information (PII) discovery tool designed to find the data hiding on computers within your business.

Anthony Caruana | 14 Mar | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place