Opinions News, Features, and Interviews

News

Hacked - The perfect attack

By Dr Claudia Johnson | 26 June, 2014 08:05

Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.

How to stay protected for Heartbleed and other OpenSSL flaws

By Anthony Caruana | 24 June, 2014 09:21

Heartbleed wasn't just an interesting Internet security story. It was a sign that one of the most fundamental building blocks relied on by many large companies was significantly flawed. Even more staggering was the revelation that the OpenSSL open source code library, that is responsible for SSL communications between systems, had another flaw that went undetected for over a decade.

Cyber threats makes it to number 4 on the Global WEF Agenda

By Gordon Makryllos | 20 June, 2014 15:52

A recent report released by the World Economic Forum (WEF) focused on the Global Agenda for 2014 and the top 10 trends facing the world. As one might expect, topping the list were globally pertinent and vital topics like; growing societal tensions in the Middle East and North Africa; income disparity around the world; and ongoing unemployment.

I've got my eye on you: Google Glass

By Dushyant Sattiraju | 28 May, 2014 16:52

Every time a revolutionary technology comes into being, basic questions such as 'do we really need this technology?' or 'how can we ensure that new technology can be put to right use?' will give raise to concerns about privacy and security.

The workspace of the future is exciting – but don’t leave the door unlocked

By Gordon Makryllos | 28 May, 2014 16:47

The digital tsunami and the move to mobile have changed the way we work forever. It is not all that long ago that we accepted our jobs as being part mobile – or at least where you could get a signal – and part tied to a desk. But no more; mobile is the new normal, it is here to stay, and the ‘workplace’ has become something altogether new and different.

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

By Jane Treadwell | 14 July, 2011 21:53

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Opinions

Once upon a information security

By Matt Hackling | 21 July, 2014 14:29

Once there were mainframes that were standalone systems, fed by punch cards and teletypewriters. They had tight roles, based on access control models, often externalised to the operating system and application.

Hacking humans

By Matt Tett | 04 July, 2014 15:49

Human factors have always been the bane of security professionals, and social engineering is also high on the list of factors requiring mitigation measures and controls. Yet their very nature makes them highly variable – humans will always work out circumvention to a control if it makes their lives easier.

It’s All About the Threat: Five Questions to Ask to Make Sure you Stay Focused

By Ammar Hindi | 27 June, 2014 08:13

Lack of cybersecurity talent coupled with the increasing complexity of threats and networks, a heightened regulatory environment, and an accelerating pace of innovation is driving many organisations to look outside their walls for cybersecurity protection.

10 tips on how to address end user risk agreements for BYOD

By Adesanya Ahmed | 26 June, 2014 20:10

With the explosion of mobile devices such as notebooks, tablets, and smartphones, mobility has become ubiquitous, which led to an increased dependency on wireless networks for business-critical services.

No budget for security? Try harder!

By Andreas Dannert | 26 June, 2014 10:26

Organisations often view security as a burden and not as an enabler. In doing so they are losing to their competition. It is like playing Russian roulette and the first one who gets hit will lose for sure, while some others might follow or get out of the game early enough.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Web Gateway

Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth.

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.