The relationship between the CIO and CSO (or CISO) can be fraught with tension - and that can be a good thing. Both executives play a critical role in your organization's C-suite, and better understanding these sometimes overlapping roles can only make your business stronger and more secure.
Sharon Florentine |
23 Apr |
A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?
Brian Eastwood |
26 Feb |
More Industries features
Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.
David Kim |
06 Jul |
There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations.
Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?
Robert Parker |
07 Jul |
Walls of greenery, circadian lighting and workspaces specially designed to accommodate activity-based working are just some of the features of Medibank’s new Docklands headquarters in Melbourne.
Chris Woodroffe |
03 Jul |
A sector as big as e-commerce, which grew at a rate of 9 per cent in Australia from 2014, warrants a very serious discussion regarding purchase security. Online shopping has become a favoured avenue because of convenience, variety and competitive pricing, yet the safety of payment practices is still being worked out.
Jessica Mayfield |
03 Jul |
Imagine if the ability to assign and manage an employee’s application and data access disappeared overnight and all of your systems and data were left wide open to everyone in your organization. Needless to say, the fallout would be disastrous. Employees would be able to see each other’s salaries, confidential trade secrets would be readily viewable and open to the world and the threat of industrial espionage after an employee’s departure would increase exponentially.
Dean Wiech |
15 Jun |
More Industries opinons