Corporate Partners

Security Leadership News, Features, and Interviews

News

How CSOs Can Help CIOs Talk Security to the Board

Most CIOs are not security experts, but in the board room they need to be. Thanks to the CSO, , they don't have to go it alone. Behind the scenes, they can help prepare the CIO, offering advice on how to interpret the company's threat levels, boiling down the most relevant information and communicating it, early and often, so the C-suite will pay attention.

Lauren Brousell | 22 Nov | Read more

Privacy is a Business Disrupter

Although there's obviously a significant interest in privacy from a legal and compliance perspective, Vodafone's head of privacy, Stephen Deadman, told the audience at the recent IAPP Summit that there's an increasing focus on economics.

Anthony Caruana | 20 Nov | Read more

US strikes massive tech support scam

The war on tech support scams continues with the latest legal action targeting operations accused of fleecing consumers of $120 million — including one that sold “lifetime” packages for a real AV product.

Liam Tung | 20 Nov | Read more

More Security Leadership news

Reviews

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Security Leadership reviews

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

More Security Leadership slideshows

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

Cloud security: how to protect your data

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

CSO staff | 14 Jun | Read more

More Security Leadership features

Opinions

R.I.P. Email?

R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.

George Fong | 21 Nov | Read more

Pervasive technologies and its implication on security

All of us are, to some extent, slaves to technology. Judicious use of technology is mandated. Human kind has, so far, been naïve in adopting technology with the presumption that it will always be used in the right spirit, but we have seen it being used in the wrong context over and over again. This article is about the implications of malicious use of pervasive technology.

Shantanu Bhattacharya | 13 Nov | Read more

How Can Organisations Deal Intelligently with Information Security Breaches?

Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.

Steve Durbin | 13 Nov | Read more

More Security Leadership opinons

Market Place