Corporate Partners

Security Leadership News, Features, and Interviews

News

Australia's ad fraud drops but so do ad-quality metrics

The percentage of fraudulent Australian online advertisements declined from the first quarter of this year to the second quarter, but an industry watcher has warned that growing risk from ad-related malware and a decline in viewability represented a “wakeup call” for Australia's online-advertising market.

David Braue | 26 Aug | Read more

Mobile Security Challenges

There’s been a massive focus on mobile security recently as the proliferation of smartphones and tablets and advent of BYOD has forced IT and security professionals to completely rethink how mobile devices and data are managed. Gartner’s Rob Smith looked at some of the challenges around mobile security at the Security and Risk Management Summit held in Sydney in August 2015.

Anthony Caruana | 24 Aug | Read more

Gartner Security and Risk Management Summit – it’s about people and balance

Earl Perkins, Research Vice President in Integrated Security and Risk Strategies, opened the Gartner Security and Risk Management Summit at Sydney’s Hilton Hotel with a statement that summarises the current state of play in the intersection between technology, business and security. The conference theme, managing risk and delivering security, is founded on six principles that will allow businesses to deliver on business needs in an increasingly complex adversarial environment.

Anthony Caruana | 24 Aug | Read more

More Security Leadership news

Reviews

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Security Leadership reviews

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

More Security Leadership slideshows

Features

CIO-CSO tension makes businesses stronger

The relationship between the CIO and CSO (or CISO) can be fraught with tension - and that can be a good thing. Both executives play a critical role in your organization's C-suite, and better understanding these sometimes overlapping roles can only make your business stronger and more secure.

Sharon Florentine | 23 Apr | Read more

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

Cloud security: how to protect your data

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

CSO staff | 14 Jun | Read more

More Security Leadership features

Opinions

Aussie Firms Must Play Catch Up or Will End Up as Easy Targets

“This week, it was announced the federal government is putting through a new bill which obliges about 1600 Telco’s and related companies to protect their networks from unauthorised access and interference. Breach notification laws have been highly effective at forcing organisations to review IT Security in countries such as the USA and Europe.

Phillip Simpson | 01 Jul | Read more

More Security Leadership opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place