Opinions News, Features, and Interviews


How to ace the CISO interview – be ready for the tough questions

Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.

Taylor Armerding | 06 Oct | Read more

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

More Opinions news


Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

More Opinions features


Data protection starts with security, but disclosure remains key

When you lock up your home, you don’t board up the windows nor roll steel gates across the property to ensure its safety. But while a simple lock isn’t difficult for thieves to bypass, your home is protected by the bigger picture; the door lock combines with the alarm system, neighbours, perhaps a dog barking, the police and common law to deter intruders. In this regard, cyber security is much the same – networks (and the Internet) are multi-layered entities containing confidential data that needs to be protected through a multi-layered strategy. That means defence in depth and breadth.

Jean Turgeon | 08 Feb | Read more

Enabling cyber strategy through data visualisation

CSOs, CISOs and Heads of Security are all confronted by one ever present issue, finite resources. The need to allocate limited resources, whether they be financial, technological or human capital is one of the few constants in an industry continually undergoing rapid change.

Charn Tangson | 05 Feb | Read more

More Opinions opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place