Industries

News

NATO sites hammered in Crimea ballot cyber protests

By Liam Tung | 17 March, 2014 09:38

Pro-Russian hacktivists claimed credit for attacks on several NATO websites on the eve of Sunday's controversial referendum in Crimea to determine whether the territory secedes from Ukraine.

Bitcoin: Can digital currencies ever be secure?

By Anthony Caruana | 14 March, 2014 23:24 | 1 Comment

Bitcoin, and the other crypto-currencies that are available, have garnered plenty of attention over the last year or so – and not all of that has been good. Some analysts have found strong correlations between the fluctuating exchange rate of Bitcoin and the activities of malware distributors and other nefarious actors. And the recent Mt Gox (a Bitcoin currency exchange) revelations that as much as half a billion dollars of Bitcoin had been stolen, rendering the company insolvent, have highlighted the volatility and transience of virtual currencies.

Don't forget all types of data in Privacy Act compliance: lawyer

By David Braue | 14 February, 2014 14:11

Organisations reviewing their exposure to new privacy policies need to remember that the full extent of personal data they collect may extend well past simple name and address information, an intellectual property lawyer has warned.

Barclays investigates lost customer files sold to rogue traders

By Liam Tung | 10 February, 2014 09:03

Barclays Bank has launched an investigation after confirming a report that sensitive files on thousands of customers was stolen and sold as leads.

Banks must learn more about customers than cyber-crims can: ThreatMetrix

By David Braue | 21 January, 2014 10:16

Financial institutions must get more proactive about collecting data on customers' digital behaviour to fight financial losses through criminals' growing use of cross-channel fraud, ThreatMetrix has warned.

Slideshows

9 tips, tricks and must-haves for security awareness programs

By Joan Goodchild | 21 June, 2013 14:53

What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.

In pictures: PM launches cyber safety program

By Hamish Barwick | 17 January, 2013 09:07

Prime Minister Julia Gillard was on hand in Sydney this week to launch a new cyber education module called bCyberwise. Developed by Life Education and McAfee, the program is designed to teach primary school students about online dangers such as becoming `friends' with strangers and cyber bullying. The program will be rolled out to Australian schools from 4 February.

AISA National Conference: In pictures

By Zennith Geisler | 11 November, 2011 10:39

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Symantec Vision 2011 Sydney in pictures

By Neerav Bhatt | 13 September, 2011 18:56

Symantec Vision 2011 Sydney in pictures

Lulzsec: the rise and fall of a hacking collective

By Liam Tung | 12 July, 2011 19:26

The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world. In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.

Features

Will Healthcare Ever Take IT Security Seriously?

By Brian Eastwood | 26 February, 2014 19:20

A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?

Opinions

Seven technology predictions for 2014

By Gordon Makryllos | 09 December, 2013 10:50 | 2 Comments

The year 2014 will be where current trends will accelerate the transformation already underway in how we consume information and do business and live. Organisations will need to evaluate their information strategy to take advantage of the emerging opportunities.

The business side of cyber security

By Ammar Hindi | 06 December, 2013 11:04

Balancing security priorities with business flexibility and agility is a tough challenge. But it’s a challenge every executive management team faces as it strives to drive business growth, achieve competitive advantage and maximise operational efficiency.

Unified communications: leading the cloud revolution

By Gordon Makryllos | 30 September, 2013 15:54

The term unified communication (UC) is a popular subject that has been floating around the workplace for some time….but is it really an essential component for businesses today? Do employees, or businesses for that matter, really understand the pros and cons?

Mobility and the mobile workspace: the new demands on the CIO

By Gordon Makryllos | 21 August, 2013 16:26

Technology, as we knew it, is no longer relevant. Every day we are bowled over with a new app, toy or technique. We are moving to a world of smart technology at a pace that is almost impossible to keep up with.

Managing trouble if your cloud is in a storm

By Gordon Makryllos | 04 July, 2013 13:02

Cloud computing comes with many key decision and considerations. There are decisions to be made around whom to choose, what to look for and what specific service it is that you ultimately need for your organisation.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Trend Micro Mobile Security

Comprehensive enterprise protection for mobile devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.