Corporate Partners

Risk News, Features, and Interviews

News

More Risk news

Slideshows

More Risk slideshows

Features

Sydney Water IT security manager talks governance strategy

Information security governance should not be treated like corporate governance, IT security steering committees must have the right stakeholders and the board can remain largely unaware of security issues. Those are key strategies for effective security governance, says IT security and assurance manager at Sydney Water, Stephen Frede.

Rodney Gedda | 03 Sep | Read more

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

Why Security Matters Now

Social networking and cloud computing threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders.

Bill Brenner | 16 Oct | Read more

More Risk features

Tutorials

Coping with a DoS attack

We keep hearing about Denial of Service attacks, and how they can bring large organisations to a standstill, yet do we really understand the full range of events that the term encompasses? What does make up a DoS (or distributed DoS) attack, how it is done, and what can you do to prevent it happening to you?

Louise McKeag | 07 Sep | Read more

More Risk tutorials

Opinions

Smart Cities deliver Innovation & Security

Smart city projects are among the most exciting technological initiatives around today and will play a major role in the world’s future growth and security. Modern technology lets us track and monitor many elements in a major urban environment – noise, light, traffic, weather, accidents and incidents, and use this data to improve people’s living and working conditions.

Gordon Makryllos | 24 Oct | Read more

Incident Response Plan

Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.

Dr Claudia Johnson | 23 Oct | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

More Risk opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place