Corporate Partners

Data Protection — News

Security threats explained: Social engineering

In this series, Computerworld Australia examines some of the information security threats facing small businesses and larger enterprises today. We’ve looked at [[artnid: 427471|internal negligence|new]] and continue the series by speaking to experts about the problem of social engineering.

Hamish Barwick | 20 Jun | Read more

Part two – Open standards are the key to building a Federated System

Greater adoption and usage of Open standards will lower the costs of MFA. There are a number of open standards in the security market. Reducing the costs to business by using open standards in deploying MFA is a practical forward looking strategy. Provisioning MFA has traditionally been costly. With a limited choice of vendors, the drivers for change have moved very slowly. Because of the high implementation and ownership costs, widespread adoption of the technology has been inhibited.

Mike Ryan | 18 Jun | Read more

CSO: the art of catching the board's ear

The success of a CSO and the enterprise’s security strategy depends on awareness at the C-level of not just the threats, but their implications, making communications and building alliances outside IT the key to a CSO’s success. The battle to secure data has become a more vicious and dynamic beast today, according to Mike Rothman, CEO of analyst firm Securosis, who says attackers, including actors who may have “very deep pockets” that tilt the balance of power in their favour. Add these to the chaos of hacktivists, well-organised cybercriminals, social media and Cloud computing, and the challenges that CSOs face in protecting corporate data become clear.

Liam Tung | 18 Jun | Read more

2012: Next-generation threats need next-generation firewalls

It wasn’t too long ago that security vendors were touting new ‘heuristic’, or behaviour based, analysis as a newfangled way to spot new viruses that were generated by hacker toolkits and didn’t match any known signature on file. These days, however, heuristics are less a luxury than the standard operating procedure as globally connected malware authors spew new threats faster than ever and even the most diligent companies continue to suffer the indignity of successful security attacks.

David Braue | 14 Jun | Read more

Market Place