Corporate Partners

Security Leadership News, Features, and Interviews

News

The week in security: Snapchat, Dropbox deny culpability for photo, account leaks

Some 100,000 photos taken from Snapchat users weren't the service's fault, although some observers were seizing on the leak to argue for an improvement in security by Snapchat and other online services. Ditto Dropbox, which was also denying it was to blame after hackers published what they claimed were excerpts from 7 million Dropbox credentials; the cloud-storage giant blamed a third-party service for the leak, but security experts were still using the event to push their case for users to adopt two-factor authentication – particularly given that cloud security and ubiquitous identity for cloud services is still over a year away.

David Braue | 21 Oct | Read more

Being FIRST in Information Security

Peter Allor is the Lead Security Strategist in IBM's Critical Infrastructure Group. He works at the forefront of information security, working with researchers to look at events, as they happen, to learn about new techniques that are being adopted by attackers from a protection perspective and how to deal with those in across distributed computing in the cloud. But he is on the board of directors of FIRST - the Forum of Incident Response and Security Teams and ICASI - the Industry Consortium for Advancement of Security on the Internet.

Anthony Caruana | 16 Oct | Read more

More Security Leadership news

Reviews

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Security Leadership reviews

Slideshows

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

In pictures: The first 24 hours of Focus11

After a day of keynotes including insights from Virgin founder, Sir Richard Branson, and break out sessions with McAfee staff, delegates were keen to let their hair down in sunny Las Vegas. With music and humour from a Rat Pack tribute act (Frank Sinatra, Sammy Davis Junior and Dean Martin), and the lure of the tables at the Palazzo hotel/ casino, there was plenty to keep staff and customers entertained well into the night.

Hamish Barwick | 20 Oct | Read more

More Security Leadership slideshows

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

Cloud security: how to protect your data

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

CSO staff | 14 Jun | Read more

More Security Leadership features

Opinions

The cost of a security breach; it’s not just about the purse strings

Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.

Brett Moorgas | 08 Oct | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

More Security Leadership opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place