Corporate Partners

Industries News, Features, and Interviews

News

The week in security: Snapchat, Dropbox deny culpability for photo, account leaks

Some 100,000 photos taken from Snapchat users weren't the service's fault, although some observers were seizing on the leak to argue for an improvement in security by Snapchat and other online services. Ditto Dropbox, which was also denying it was to blame after hackers published what they claimed were excerpts from 7 million Dropbox credentials; the cloud-storage giant blamed a third-party service for the leak, but security experts were still using the event to push their case for users to adopt two-factor authentication – particularly given that cloud security and ubiquitous identity for cloud services is still over a year away.

David Braue | 21 Oct | Read more

Identity is the Key to Security

Security is big business these days. With our old approach of blocking everyone at the border failing - mainly because no-one knows where the border is anymore - a risk-based approach is driving the way businesses think about their information and systems security.

Anthony Caruana | 22 Oct | Read more

Being FIRST in Information Security

Peter Allor is the Lead Security Strategist in IBM's Critical Infrastructure Group. He works at the forefront of information security, working with researchers to look at events, as they happen, to learn about new techniques that are being adopted by attackers from a protection perspective and how to deal with those in across distributed computing in the cloud. But he is on the board of directors of FIRST - the Forum of Incident Response and Security Teams and ICASI - the Industry Consortium for Advancement of Security on the Internet.

Anthony Caruana | 16 Oct | Read more

More Industries news

Slideshows

In pictures: PM launches cyber safety program

Prime Minister Julia Gillard was on hand in Sydney this week to launch a new cyber education module called bCyberwise. Developed by Life Education and McAfee, the program is designed to teach primary school students about online dangers such as becoming `friends' with strangers and cyber bullying. The program will be rolled out to Australian schools from 4 February.

Hamish Barwick | 17 Jan | Read more

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Industries slideshows

Features

Will Healthcare Ever Take IT Security Seriously?

A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?

Brian Eastwood | 26 Feb | Read more

More Industries features

Opinions

The cost of a security breach; it’s not just about the purse strings

Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.

Brett Moorgas | 08 Oct | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

More Industries opinons

Market Place