Corporate Partners

Physical Security News, Features, and Interviews

News

Is fragmentation killing Android in the enterprise?

Android may rule consumer smartphone shipments, but it’s getting trounced in the enterprise. So is Google’s new enterprise mobile security plan up to the task of raising Android's measly share of the enterprise? The answer may lie in the diversity of "the enterprise".

Liam Tung | 27 Feb | Read more

Shadow IT threat lingers as ANZ businesses drag feet on cloud moves

Less than 1 in 4 Australian and New Zealand businesses is in the advanced stages of planning their cloud rollout – yet with nearly half of CEOs and board members supporting the paradigm and 60 percent of respondents reporting security issues, the other organisation are not free from problems related to the cloud, a Red Hat customer survey has found.

David Braue | 26 Feb | Read more

The week in security: Data retention looms, Superfish gutted

Are your staff suitably trained to detect and ignore phishing spam? If not, you may want to revisit your policies: in the latest security embarrassment, banks in 30 countries have been systematically deprived of more than $US1 billion by cybercriminals due to what many are attributing to poor staff training around the handling of malware threats. Indeed, despite billions spent on security tools one study found that researchers were able to garner sensitive information in 88 percent of attempts just by using their eyes.

David Braue | 24 Feb | Read more

More Physical Security news

Reviews

USB Secure Flash Drive Product Review

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?

Enex Testlab | 24 Aug | Read more

More Physical Security reviews

Slideshows

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

Security 2011 show hits Sydney: Gallery

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Neerav Bhatt | 25 Aug | Read more

More Physical Security slideshows

Opinions

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks

Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.

Anthony Stitt | 18 Feb | Read more

Why businesses have never been more vulnerable to large DDoS attacks

Recently there has been an almost constant feed of news around distributed denial of service (DDoS) attacks, with banks, gaming organisations, governments, educational establishments and e-commerce vendors all being attacked. The DDoS threat has evolved considerably over recent years, with significant changes in the frequency and scale of attacks, and the motivations of cyber criminals. And, over a similar period, many organisations have become highly dependent on the availability of Internet services for their business continuity.

Nick Race | 12 Jan | Read more

Sony Hack Attack

There’s been a lot of coverage recently around Sony Pictures and the hack attack which has placed Sony in the headlines for all the wrong reasons, with high volumes of sensitive company data stolen and posted online.

David Baker | 22 Dec | Read more

More Physical Security opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place