The switch to IP cameras is on – and it's hard

By Anthony Caruana | 10 April, 2014 16:21

The physical security world has been in the midst of a significant change over recent years. Old security cameras, that could be connected with a coaxial cable and some power, are giving way to IP enabled devices. This has lead to a complete rethink on how security systems are designed, deployed, operated and maintained.

Unconventional crisis planning

By Anthony Caruana | 10 April, 2014 16:16

There's not a company worth its salt that hasn’t, at least, given some consideration to crisis planning. Most of our crisis planning is based upon basic risk management strategies. Come up with a bunch of potential scenarios, apply some analysis to get a handle on likelihood and impact, and then come up with mitigation and management strategies.

Gartner's vision of infosec 2019: four scenarios, all bad

By Stilgherrian | 28 August, 2013 13:38

Will it be the total surveillance society and internet licenses? A breakdown of authority, with e-militias fighting extreme anarcho-hactivists? Or one of the other two?

Preparing for an Attack: 5 Tips for Organisations

By Chris Wood | 14 August, 2013 18:00

Even the most security diligent organisations are realising that breaches are no longer a question of ‘if’ but a question of ‘when.’ Yet many organisations still do not factor the inevitability of compromises into their overall defense strategy, instead focusing on controls to keep every conceivable type of threat at bay. However, the ability to use controls to close every gap attackers can find and reduce the surface area of attack to zero is fundamentally flawed.

Security Mistakes Your Mobile Workforce Makes

By Steve Schoenfeld | 06 August, 2013 23:53

The surge in mobile computing and BYOD (bring your own device) initiatives is translating to higher productivity and job satisfaction for your workforce—but it’s also creating alluring new opportunities for cybercriminals.


Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

By Jane Treadwell | 14 July, 2011 21:53

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.


The Holy Grail – BYOD, COPE or CYOD

By Ennio Carboni, EVP of customer advocacy, Ipswitch | 24 April, 2014 12:27

Finding the ideal alignment and balance between hardware, software and employee preference has become the holy-grail for those tasked with defining enterprise mobility strategy.

Security versus performance: a tug of war?

By John Ellis | 11 April, 2014 13:56

As security threats have evolved over the past 10 years, online retailers have been under increasing pressure to protect digital properties without impacting performance levels, all on a budget.

Building a custom defence solution

By Sanjay Mehta | 11 April, 2014 13:43

At a time when targeted attacks continue to be the methodology of choice by cyber criminals, Sanjay Mehta, managing director at Trend Micro Australia and New Zealand, discusses how Australian businesses should look beyond standard industry security products and solutions to build custom defence strategies unique to their organisation. He outlines the best way for companies to individually detect, analyse, adapt, and respond to targeted attacks.

How secure is SSL? – the answer might surprise you

By Jonathan Andresen | 09 April, 2014 17:27

Enterprises and online businesses face mounting challenges as the use of secure web based content and applications continue to grow. Easy-to-access, highly mobile, and social are the new user mantras of today’s IT.

The cognitive era in the 'as-a-service app' paradigm – CaaS

By Gordon Makryllos | 09 April, 2014 16:59

Devices are getting smarter, faster and increasingly cognitive. All around us we see the continuing rapid evolution of electronic devices, both mobile and fixed, into the next generation of tools that will help us live our lives differently.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security and Compliance Solutions

Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.