Corporate Partners

Identity & Access News, Features, and Interviews

News

Nearly half of employees inadequately trained on Privacy Act compliance

Only 54 percent of workers believe their employers have given them adequate training about how to preserve the privacy of customers' personally identifiable information (PII), a new survey has found as privacy authorities spruik a new privacy management framework designed to help Australian organisations improve privacy compliance efforts that have been slammed as inconsistent and unbelievable by consumers.

David Braue | 08 May | Read more

Channel growth a key focus for Webroot's new Asia-Pacific head

A strengthened focus on channel partners and the capitalisation of recent technology acquisitions will fuel a redoubled assault on the Asia-Pacific endpoint security market as Webroot's newly appointed APAC regional managing director, Robbie Upcroft, settles into his new role as steward of an ever-harder battle against the growing tide of malware actors.

David Braue | 06 May | Read more

More Identity & Access news

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

The encryption quiz

The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.

Tim Greene and Jim Duffy | 29 Sep | Read more

Security 2011 show hits Sydney: Gallery

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Neerav Bhatt | 25 Aug | Read more

More Identity & Access slideshows

Features

It Wasn’t Me, It Was Bennett Arron

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Bennett Arron | 11 Jul | Read more

More Identity & Access features

Opinions

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

The Active International Response to Cyber Crime

The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.

Mark Gregory | 26 Mar | Read more

Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

Return on Prevention: The Business Value of DDoS Protection

DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.

Nick Race | 09 Mar | Read more

More Identity & Access opinons

Market Place