Corporate Partners

Opinion News, Features, and Interviews

News

Security threats through the Cloud

As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

Gordon Makryllos | 24 Sep | Read more

More Opinion news

Features

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

IT Advocate: The privacy minefield

There are significant differences between state and federal privacy legislation. CIOs who deal with government agencies or other public sector organisations must determine the privacy laws applicable to them – and how best to accommodate them.

Emma Weedon | 15 Sep | Read more

Five mistakes security pros would make again

Ten years ago, Michael Riva was network administrator for a top-five American consultancy. Employees were downloading graphic pictures and videos onto the network. Riva told his boss a proxy server with content filtering might be in order; his boss laughed and suggested they put in a bigger file server instead.

Bill Brenner | 30 Sep | Read more

More Opinion features

Opinions

Making the Best of BYOx

A mere handful of years ago, many of us were jealous of that one friend or coworker who was flashing their new iPhone, a mysterious gadget we couldn’t wait to get our hands on. Fast forward to the present, less than a decade later, it seems everyone you know owns a shiny new ultrathin phablet. Billions of people worldwide use smartphones, tablets, or phablets to run their personal and professional lives. They go with us everywhere, from bedside to kitchen table to workplace. This rapid rise of consumerised mobile technology has upended everything from our most intimate relationships to broader cultural dynamics.

Steve Durbin | 20 May | Read more

Three considerations to ensure your network is ready for the Internet of Things

The first thought that comes to mind for most consumers when they hear the mention of the Internet of Things (IoT) is their fridge telling them when the eggs have run out; shoes indicating how far they have travelled; cars keeping them up to date on local traffic so that they know which routes to avoid; or energy meter signaling how much heating has been consumed. While not all of these capabilities have become a reality across most households, Gartner predicts the use of connected devices to grow exponentially, with at least 4.9 billion connected things expected to be in use this year, which is up 30 percent from 2014. By 2020, Gartner forecasts this number to reach 25 billion .

Matt Miller | 20 May | Read more

5 reasons why using a VDC (Virtual Data Centre) can improve your organisations Physical and Logical Security

A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure.   With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways

Gerardo Altman | 19 May | Read more

More Opinion opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place