Corporate Partners

Risk Management News, Features, and Interviews

News

Optus undertakes extensive security review as sanction for “significant” privacy breaches

Number-two telecommunications company SingTel Optus will undergo a wide ranging, independent review of its information-security systems after working with the Office of the Australian Information Commissioner (OAIC) to finalise an enforceable undertaking relating to what privacy commissioner Timothy Pilgrim has called three “significant” breaches of customer privacy last year.

David Braue | 31 Mar | Read more

The week in security: Now law in Australia, data retention challenged overseas

It was a banner week for the handling of personal information, with Australia's controversial metadata retention laws becoming law after Labor capitulated on its previous opposition to the legislation. Similar issues were at the fore in the US – where numerous technology companies pressed the US government to stop its collection of metadata – and Europe, where Dutch telcos were ordered to delete data retained under previous data-retention laws after they were found to be unconstitutional. And the EU's high court wasset to revisit the ability of US companies to handle the zealously-protected personal information of EU citizens.

David Braue | 30 Mar | Read more

More Risk Management news

Slideshows

More Risk Management slideshows

Features

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?

Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".

David Geer | 24 Jan | Read more

More Risk Management features

Opinions

Tackling the human element of cyber security

The number and complexity of cyber-attacks has been increasing steadily over the last decade. Many adversaries are targeting the communications and information systems of organisations to extract large amounts of sensitive data, often hijacking insider credentials as a preferred method of breach. Identity has become today’s biggest security gap.

Dean Nicholls | 31 Mar | Read more

10.5 Tips to Protect Your Magento Store from Smart Hacker

E-commerce and financial websites stand first in the list of possible victims of cyber crime, as these websites deal with the monetary transactions. Being one of the most popular ecommerce platforms, Magento is also under threat of hacking attacks and unauthorized logins. Magento comes with various built-in security features, still there is always more that can be done in order to protect your online store from the smart hackers. With rich expertise in enhancing Magento security, I want to share with you some tips that will help you to protect your online store and keep hackers at bay.

Linda Phillips | 31 Mar | Read more

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

More Risk Management opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place