Corporate Partners

Risk News, Features, and Interviews

News

The week in security: Trust us, we're the government

Much of the problem with today's security environment is that it's hard to know who to trust – but the US Department of Justice believes it has the answer: companies should trust the government's efforts around cybersecurity more than they currently do, the DOJ is suggesting. The same goes in Australia, where the newly formed Australian Cyber Security Centre was soliciting reports of security breaches to inform its work

David Braue | 15 Dec | Read more

More Risk news

Slideshows

More Risk slideshows

Features

Sydney Water IT security manager talks governance strategy

Information security governance should not be treated like corporate governance, IT security steering committees must have the right stakeholders and the board can remain largely unaware of security issues. Those are key strategies for effective security governance, says IT security and assurance manager at Sydney Water, Stephen Frede.

Rodney Gedda | 03 Sep | Read more

Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

Why Security Matters Now

Social networking and cloud computing threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders.

Bill Brenner | 16 Oct | Read more

More Risk features

Tutorials

Coping with a DoS attack

We keep hearing about Denial of Service attacks, and how they can bring large organisations to a standstill, yet do we really understand the full range of events that the term encompasses? What does make up a DoS (or distributed DoS) attack, how it is done, and what can you do to prevent it happening to you?

Louise McKeag | 07 Sep | Read more

More Risk tutorials

Opinions

Rise of the elastic perimeter

Over the centuries, humans have built walls to keep intruders at bay. The Romans and Chinese were particularly adept at constructing extensive barricades: the Romans built Hadrian’s Wall in northern England and the Antonine Wall across what is now the Central Belt of Scotland, while the Chinese first started construction of would become the Great Wall of China in the 7th century BC.

Puneet Kukreja | 11 Dec | Read more

A Look Back At Information Security in 2014

With the major financial card breaches at global retailers, as well as a number of SSL/TLS vulnerabilities, it’s possible you may have missed a few other under-reported security issues that provided valuable lessons to the general technology community in 2014.

Thu Pham | 10 Dec | Read more

Identifying the visibility gaps in your security

‘Once more unto the breach’…When Henry V uttered those immortalised words in Shakespeare’s play; most enemy attacks were fought on the battlefield. Yet in modern times, many ambushes come in the form of cyber attacks that wreak havoc in the shadows. These data breaches affect all organisations, not just governments, and also more commonly small and mid-sized businesses.

Brett Moorgas | 10 Dec | Read more

Identity governance: It’s all about the people

New technologies like bring your own identity (BYOI) provide the agility that organisations need to compete in the digital economy, as Jan Zeilinga demonstrated in last month’s blog. But let’s not forget that getting the house in order is an important prerequisite to going “digital”. Employees and contractors need access to the right information to do their jobs, and organisations need to ensure that digital assets are used appropriately.

John Havers | 10 Dec | Read more

More Risk opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place