Opinion News, Features, and Interviews

News

How to ace the CISO interview – be ready for the tough questions

Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.

Taylor Armerding | 06 Oct | Read more

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

More Opinion news

Features

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

IT Advocate: The privacy minefield

There are significant differences between state and federal privacy legislation. CIOs who deal with government agencies or other public sector organisations must determine the privacy laws applicable to them – and how best to accommodate them.

Emma Weedon | 15 Sep | Read more

More Opinion features

Opinions

​Prelude to a HACK

It all sounds harmless to post and share information, but to attackers these are great clues and can form the basis of a hack. Social engineering is a technique used as a foundational step to collect information for open sources.

David Gee | 09 Feb | Read more

Data protection starts with security, but disclosure remains key

When you lock up your home, you don’t board up the windows nor roll steel gates across the property to ensure its safety. But while a simple lock isn’t difficult for thieves to bypass, your home is protected by the bigger picture; the door lock combines with the alarm system, neighbours, perhaps a dog barking, the police and common law to deter intruders. In this regard, cyber security is much the same – networks (and the Internet) are multi-layered entities containing confidential data that needs to be protected through a multi-layered strategy. That means defence in depth and breadth.

Jean Turgeon | 08 Feb | Read more

Enabling cyber strategy through data visualisation

CSOs, CISOs and Heads of Security are all confronted by one ever present issue, finite resources. The need to allocate limited resources, whether they be financial, technological or human capital is one of the few constants in an industry continually undergoing rapid change.

Charn Tangson | 05 Feb | Read more

More Opinion opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place