Corporate Partners

Risk News, Features, and Interviews

News

Optus undertakes extensive security review as sanction for “significant” privacy breaches

Number-two telecommunications company SingTel Optus will undergo a wide ranging, independent review of its information-security systems after working with the Office of the Australian Information Commissioner (OAIC) to finalise an enforceable undertaking relating to what privacy commissioner Timothy Pilgrim has called three “significant” breaches of customer privacy last year.

David Braue | 31 Mar | Read more

The week in security: Now law in Australia, data retention challenged overseas

It was a banner week for the handling of personal information, with Australia's controversial metadata retention laws becoming law after Labor capitulated on its previous opposition to the legislation. Similar issues were at the fore in the US – where numerous technology companies pressed the US government to stop its collection of metadata – and Europe, where Dutch telcos were ordered to delete data retained under previous data-retention laws after they were found to be unconstitutional. And the EU's high court wasset to revisit the ability of US companies to handle the zealously-protected personal information of EU citizens.

David Braue | 30 Mar | Read more

More Risk news

Slideshows

More Risk slideshows

Features

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?

Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".

David Geer | 24 Jan | Read more

Sydney Water IT security manager talks governance strategy

Information security governance should not be treated like corporate governance, IT security steering committees must have the right stakeholders and the board can remain largely unaware of security issues. Those are key strategies for effective security governance, says IT security and assurance manager at Sydney Water, Stephen Frede.

Rodney Gedda | 03 Sep | Read more

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

Why Security Matters Now

Social networking and cloud computing threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders.

Bill Brenner | 16 Oct | Read more

More Risk features

Tutorials

Coping with a DoS attack

We keep hearing about Denial of Service attacks, and how they can bring large organisations to a standstill, yet do we really understand the full range of events that the term encompasses? What does make up a DoS (or distributed DoS) attack, how it is done, and what can you do to prevent it happening to you?

Louise McKeag | 07 Sep | Read more

More Risk tutorials

Opinions

Tackling the human element of cyber security

The number and complexity of cyber-attacks has been increasing steadily over the last decade. Many adversaries are targeting the communications and information systems of organisations to extract large amounts of sensitive data, often hijacking insider credentials as a preferred method of breach. Identity has become today’s biggest security gap.

Dean Nicholls | 31 Mar | Read more

10.5 Tips to Protect Your Magento Store from Smart Hacker

E-commerce and financial websites stand first in the list of possible victims of cyber crime, as these websites deal with the monetary transactions. Being one of the most popular ecommerce platforms, Magento is also under threat of hacking attacks and unauthorized logins. Magento comes with various built-in security features, still there is always more that can be done in order to protect your online store from the smart hackers. With rich expertise in enhancing Magento security, I want to share with you some tips that will help you to protect your online store and keep hackers at bay.

Linda Phillips | 31 Mar | Read more

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

More Risk opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place