Opinions News, Features, and Interviews


How to ace the CISO interview – be ready for the tough questions

Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.

Taylor Armerding | 06 Oct | Read more

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

More Opinions news


Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

More Opinions features


CSO Security Priorities Survey – prize terms and conditions

​By participating in CSO and Gigamon's survey on Security Priorities​, you will go into the draw for a chance to win a Apple iWatch Sport or the equivalent of $500 Visa Cashcard. Simply complete the survey in full to go into the draw. The survey opens on 27/11/2015 and closes on 29/02/2016. The prize draw will take place on 11th March 2016.

CSO staff | 27 Nov | Read more

​Visibility and control over SSL traffic in an era of HTTP/2.0

The emergence of attacks like POODLE and Heartbleed, has brought about renewed awareness about the importance of Secure Sockets Layer (SSL). At the enterprise level, SSL is what enables businesses to communicate securely with customers and partners. In order to keep SSL secure, businesses must have the visibility and control over SSL/ Transport Layer Security (TLS) traffic in the era of HTTP/2.0.

Benn Alp | 25 Nov | Read more

​Smart Phones Have Not So Smart Security

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have empowered the disenfranchised, democratized information sharing, and shined a spotlight on corruption. They are also addictive and pervasive, affecting everything from personal health to public safety. And all of this has happened in less than ten years.

Dan Ross | 20 Nov | Read more

More Opinions opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place