Identity & Access

News

Peoplebank processing contractors faster with cloud-based PKI

By David Braue | 02 April, 2014 17:22

Specialist recruitment giant Peoplebank is seeing significant time savings after implementing a digital signature system that has significantly improved its everyday work processes.

Users' brains scanned in bid to fix infosec

By Sam Bells | 15 March, 2014 10:32

Security system design and user education could benefit from neuralimaging that uses brain scans to determine the way personality types may react to threats, new research shows.

Wearable Tech - Can your life be hacked?

By Anthony Caruana | 07 March, 2014 10:30

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

Online threats driving password-management acceptance: Siber

By David Braue | 07 January, 2014 17:16 | 5 Comments

No CSO would be unaware of users' resistance to complex and often arbitrary password-management schemes, but one password-management vendor believes the battle is not yet lost as the slowly-expanding profile of password-management tools gives enterprises large and small the ability to help employees manage a swag of complex online passwords.

2014, the year that infosec gets political

By Stilgherrian | 06 January, 2014 10:19

2013 has certainly been a watershed year for information security. But to understand how things might subsequently unfold in 2014, it's worth remembering that each and every revelation of 2013 will be processed and acted upon by humans. Humans with their unchanging human nature, and organisations created by us humans, with their similarly unchanging nature.

Slideshows

Destroying data to protect against fraud

By Neerav Bhatt | 18 October, 2011 07:39

Destroying data to protect against fraud.

The encryption quiz

By Tim Greene and Jim Duffy | 29 September, 2011 20:12

The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.

Symantec Vision 2011 Sydney in pictures

By Neerav Bhatt | 13 September, 2011 18:56

Symantec Vision 2011 Sydney in pictures

Security 2011 show hits Sydney: Gallery

By Neerav Bhatt | 25 August, 2011 11:49

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Features

It Wasn’t Me, It Was Bennett Arron

By Bennett Arron | 11 July, 2011 18:31

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Opinions

Opinion: How safe is your customer identity data?

By Anton Koren | 14 July, 2011 22:52

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.