Corporate Partners

Opinions News, Features, and Interviews


How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

Security threats through the Cloud

As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

Gordon Makryllos | 24 Sep | Read more

More Opinions news


Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

More Opinions features


Citrix's Health Survey – prize terms and conditions

By participating in CSO and Citrix's survey on Health, you will go into the draw for a chance to win a Apple iWatch Sport or the equivalent of $400 Visa Cashcard. Simply complete the Citrix's survey in full to go into the draw. The survey opens on 30/07/2015 and closes on 01/12/2015. The prize draw will take place on 4th December 2015.

CSO staff | 04 Aug | Read more

Five top security threats to data centres – and how to counter them

Every day, attackers conspire to take down applications and steal data, leaving data centre infrastructure in the crosshairs. Storing an organisation’s most valuable and most visible assets - its web, DNS, database and email servers – data centres have become the number one target of cyber criminals, hacktivists and state-sponsored attackers.

Greg Barnes | 04 Aug | Read more

Are We Still Talking About Big Data?

Over the last few years, the term ‘big data’ has been hugely pervasive in marketing circles on a global scale. The big data movement has had businesses both large and small rushing to install analytics tools in their droves; but data is only as useful as what you do with it. Now, with big data firmly in the limelight, the question is how to identify and apply the insights offered by it in order to gain an advantage in a competitive market.

Martin Alexander | 04 Aug | Read more

Cyber Security and Web Hosting: How Safe is Your Data?

Cyber security is a rising concern - a fact made evident by the announcement of Google’s latest service, a feature in its Cloud Platform services to lock up your computer engine data with encryption keys, this past Tuesday, July 28th. Indeed, Google is not alone in this venture, as Amazon offers a similar encryption service for its CloudHSM host, and Microsoft offers Key Vault. The growing implementation of security features points to the growing concern for this need for security.

Alice Winslow | 04 Aug | Read more

More Opinions opinons

Market Place