Corporate Partners

Data Security News, Features, and Interviews

News

The week in security: iappANZ weighs privacy progress; Obama, industry fight government spying

Privacy Commissioner Timothy Pilgrim released a new Privacy Regulatory Action Policy as the iappANZ Privacy Summit kicked off. Also instructive on the policy front was Scotland's National Health Service, which shared its experience meeting healthcare privacy requirements with attendees. Vodafone's head of privacy was also on hand, pointing out that economics is playing an increasing role in discussions about the risks of privacy.

David Braue | 25 Nov | Read more

Privacy is a Business Disrupter

Although there's obviously a significant interest in privacy from a legal and compliance perspective, Vodafone's head of privacy, Stephen Deadman, told the audience at the recent IAPP Summit that there's an increasing focus on economics.

Anthony Caruana | 20 Nov | Read more

US strikes massive tech support scam

The war on tech support scams continues with the latest legal action targeting operations accused of fleecing consumers of $120 million — including one that sold “lifetime” packages for a real AV product.

Liam Tung | 20 Nov | Read more

More Data Security news

Reviews

Review: Secure Flash Drives

USB flash drives are the modern floppy, albeit considerably larger and faster. They make our lives easy for taking data on the road, sharing with colleagues over sneakernet, and given their rapidly increasing size even acting as backup devices. They're also darn handy for installing software from ISO images.

Ashton Mills | 13 Sep | Read more

USB Secure Flash Drive Product Review

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?

Enex Testlab | 24 Aug | Read more

The security suite guide 2010

Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk.

Frank J. Ohlhorst | 18 Aug | Read more

More Data Security reviews

Slideshows

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Data Security slideshows

Features

Secure USB Drives Not So Secure

Several hardware-encrypted USB memory sticks are now part of a worldwide recall and require security updates because they contain a flaw which could allow hackers to easily gain access to the sensitive information contained on the device.

Joan Goodchild | 07 Jan | Read more

Is Compliance in the Cloud Possible?

There is no doubt that cloud computing is dominating today's IT conversation among C-level security executives. Whether it's due to the compelling cost saving possibilities in a tough economy, or because of perceived advantages in provisioning flexibility, auto-scaling, and on-demand computing, CSOs are probing the capabilities, costs and restrictions of the cloud. At the same time, security and compliance concerns are at the forefront of issues potentially holding large enterprises back from capitalizing on the benefits that cloud computing has to offer.

Jim Hietala | 07 Jan | Read more

Best Practices For IT Availability

Forrester often gets inquiries such as, "What requirements should we keep in mind while developing our disaster recovery plans and documents?" and, "Which strategies work best for managing our disaster recovery program once it's in place?"

Stephanie Balaouras | 17 Dec | Read more

A Practical Approach to Protecting Trade Secrets

Trade secrets are increasingly becoming a company's most valuable assets, and not surprisingly, threats to those assets have increased concomitantly. The greatest threat to company data is, of course, not outsiders but a company's own employees A company's ability to protect against rogue employees (as well as against unintentional harm) is governed by both federal and state laws, which vary by jurisdiction and, worse, are in a state of flux in many of those jurisdictions.

Russell Beck and Matt Karlyn | 12 Nov | Read more

More Data Security features

Tutorials

More Data Security tutorials

Opinions

SOFTWARE-DEFINED NEUTRALISATION OF CYBER RISKS

Putting a strong lock on a weak door is unlikely to deter thieves, particularly when there are valuables inside. Yet all too often in the battle against cyber attacks, businesses do just that: they attach advanced digital security systems to inherently insecure corporate network infrastructures. The net result is enterprise IT capabilities that keep those tasked with maintaining risk registers and ensuring data security awake at night, and frustration for those who want to embrace next generation mobility and cloud technologies to generate efficiencies and competitive advantage.

John Suffolk | 24 Nov | Read more

Peeling back the darknet

Most organisations are unaware of the need to bring darknet expertise in-house to ensure that there will be no surprises bubbling out of the darkness. The darknet does not have a pretty face, but it is not entirely evil either; so what is it that your organisation should know about the darknet, and why?

Mark Gregory, RMIT | 24 Nov | Read more

R.I.P. Email?

R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.

George Fong | 21 Nov | Read more

How Can Organisations Deal Intelligently with Information Security Breaches?

Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.

Steve Durbin | 13 Nov | Read more

More Data Security opinons

Market Place