Data Security News, Features, and Interviews


Symantec courting Australian security talent as Sydney facility opened

By David Braue | 27 August, 2014 13:20

Australia has a strong base of skilled security professionals to tap into, but a “dearth of security talent” will drive helped strengthen the case to invest heavily in the expansion of a Sydney facility that will form an increasingly important part of Symantec's global managed-security and security research capability.

Symantec opens new Security Operations Centre

By Anthony Caruana | 25 August, 2014 10:55

Celebrating 25 years in Australia, Symantec has opened its new office and Security Operations Centre in Sydney. The $12M project has centralised all of Symantec's Sydney operations with 375 of the their 500 Australian staff now in a new office facility.

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

By Brad Chacos | 22 August, 2014 08:12

It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

The week in security: Password managers, IT managers under fire over security disconnect

By David Braue | 21 July, 2014 14:54

Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.

The week in security: IoT a new threat frontier as open-source advocates patch old ones

By David Braue | 08 July, 2014 08:19

Increasingly high-profile security attacks – most recently, a data breach at US restaurant chain PF Chang that was attributed to a 'highly sophisticated criminal operation' even as gangs hit more businesses through remote accounts – were kindling interest in encryption and other less high-profile technologies amongst high-level executives, by some accounts.


Review: Secure Flash Drives

By Ashton Mills | 13 September, 2012 09:00

USB flash drives are the modern floppy, albeit considerably larger and faster. They make our lives easy for taking data on the road, sharing with colleagues over sneakernet, and given their rapidly increasing size even acting as backup devices. They're also darn handy for installing software from ISO images.

Review : Clearswift SECURE Web Gateway 2.5

By Matt Hackling | 20 March, 2012 13:35 | 2 Comments

We were eager for this box to arrive from Clearswift, this kind of kit gets us excited. We were expecting a hardware appliance to be shipped to us, but when opened the box, all we found was a 1RU Dell Server.

USB Secure Flash Drive Product Review

By Enex Testlab | 24 August, 2011 12:04 | 3 Comments

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?

The security suite guide 2010

By Frank J. Ohlhorst | 18 August, 2010 08:54

Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk.


AISA National Conference: In pictures

By Zennith Geisler | 11 November, 2011 10:39

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Destroying data to protect against fraud

By Neerav Bhatt | 18 October, 2011 07:39

Destroying data to protect against fraud.

USB devices: The big hole in network security

By Ellen Messmer | 24 August, 2011 12:42

Ponemon Institute asked 745 information-technology and security managers whether USB drives were important for business use, and if they were secure. What did the survey find?

Laptop losers hall of shame

By Carolyn Duffy Marsan | 26 May, 2008 10:40

The 10 worst security breaches of all time from unencrypted data.

20 useful IT security Web sites

By Jon Brodkin | 08 April, 2008 09:50

Bookmarking these sites will help you protect your network, comply with government regulations and stay ahead of all the latest threats.


Secure USB Drives Not So Secure

By Joan Goodchild | 07 January, 2010 06:16

Several hardware-encrypted USB memory sticks are now part of a worldwide recall and require security updates because they contain a flaw which could allow hackers to easily gain access to the sensitive information contained on the device.

Is Compliance in the Cloud Possible?

By Jim Hietala | 07 January, 2010 06:47

There is no doubt that cloud computing is dominating today's IT conversation among C-level security executives. Whether it's due to the compelling cost saving possibilities in a tough economy, or because of perceived advantages in provisioning flexibility, auto-scaling, and on-demand computing, CSOs are probing the capabilities, costs and restrictions of the cloud. At the same time, security and compliance concerns are at the forefront of issues potentially holding large enterprises back from capitalizing on the benefits that cloud computing has to offer.

Best Practices For IT Availability

By Stephanie Balaouras | 17 December, 2009 04:40

Forrester often gets inquiries such as, "What requirements should we keep in mind while developing our disaster recovery plans and documents?" and, "Which strategies work best for managing our disaster recovery program once it's in place?"

A Practical Approach to Protecting Trade Secrets

By Russell Beck and Matt Karlyn | 12 November, 2009 05:22

Trade secrets are increasingly becoming a company's most valuable assets, and not surprisingly, threats to those assets have increased concomitantly. The greatest threat to company data is, of course, not outsiders but a company's own employees A company's ability to protect against rogue employees (as well as against unintentional harm) is governed by both federal and state laws, which vary by jurisdiction and, worse, are in a state of flux in many of those jurisdictions.

Facebook, Twitter provide sensitive info for criminals

By Tony Bradley | 28 August, 2009 06:48

Social networking services like Facebook and Twitter foster a false sense of security and lead users to share information which can be used by cybercriminals and social engineers. The very concept of social networking is based on connecting and sharing, but with who?


10 tech-management tips

By Julie Bort | 18 January, 2007 13:19

Ten simple tips to manage your enterprise technology.


Five information security and big data forecasts for 2014

By Eddie Sheehy | 28 January, 2014 13:56

In 2013, high-profile data leaks led many people to question how governments and businesses across the globe gather and store citizens’ data. The year also saw no end to the growth in corporate data stores and Australian companies moving more of their data to the cloud.

Privacy in the era of big data and cloud

By Puneet Kukreja | 18 December, 2013 13:42

Privacy is simply defined as a state in which one is not observed or disturbed by other people. Taking this definition further is Article 12 of the Universal Declaration of Human Rights which states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”

Three Facts of Data Security Legislation for the Cloud

By Puneet Kukreja | 19 December, 2012 12:49

Over the last 2-3 years cloud computing has promised, and in many instances delivered, a lower total cost of ownership. This has helped organisations return the focus of operation to their core activities—reducing the effort spent on managing IT infrastructure and applications.

Putting the 'A' in availability

By Matt Hackling | 28 November, 2012 13:49

After the debacle that has been Click Frenzy, I'm going to focus on availability. Click Frenzy was a coordinated advertising promotion with a large number of Australian online shopping websites. This sounded like a great idea, and many retailers paid good money to be part of it. The problem was that the click frenzy website struggled under the load and so did a few of the online retailers, resulting in a vicious backlash on social media.

Is anything private in Web 2.0?

By Olan Ahern | 23 November, 2012 10:17

The answer to this question is simple: no. With the developments in social media and two-way communication channels such as Twitter, Facebook and YouTube, it has made social privacy somewhat non-existent.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory


RSA offers a wide range of strong two-factor authentication solutions to help organizations assure user identities and meet compliance requirements.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.