Corporate Partners

Opinion News, Features, and Interviews

News

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

Security threats through the Cloud

As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

Gordon Makryllos | 24 Sep | Read more

More Opinion news

Features

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

IT Advocate: The privacy minefield

There are significant differences between state and federal privacy legislation. CIOs who deal with government agencies or other public sector organisations must determine the privacy laws applicable to them – and how best to accommodate them.

Emma Weedon | 15 Sep | Read more

Five mistakes security pros would make again

Ten years ago, Michael Riva was network administrator for a top-five American consultancy. Employees were downloading graphic pictures and videos onto the network. Riva told his boss a proxy server with content filtering might be in order; his boss laughed and suggested they put in a bigger file server instead.

Bill Brenner | 30 Sep | Read more

More Opinion features

Opinions

Cyber-security: Are Fortresses Being Built on Quicksand?

The increased prevalence of cyber-security breaches underscores just how vulnerable enterprises are to malware and hackers. The risks associated with these incidents are now widely known, and CEOs are looking closely at the measures their IT and security teams are taking to fend off potentially catastrophic intrusions. But are they doing enough?

Steve Beards | 30 Jun | Read more

Choose Your Security as a Service Carefully

If there's one topic that is likely to make any CIO's or IT Manager's wallet hurt, it's information security. With all the media coverage lately on data theft, credit card theft, Personally Identifiable Information (PII) theft and identity theft, every organisation from the sole proprietorship to the massive international megacorp to the critical government agency knows that they need it and suspects that they lack it. It's one thing when a small-town restaurant's Twitter account gets hacked, but it's something else entirely when a government agency charged with performing background checks for security clearances cannot keep the PII of its investigation subjects secure.

David Kelleher | 30 Jun | Read more

A move towards cyber resilience in a world without borders

Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.

John Ellis | 15 Jun | Read more

More Opinion opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place