A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.
Jane Treadwell |
14 Jul |
C-level executives are more aware than ever about threats to information security.
James Hutchinson |
19 Jan |
To use Cloud computing securely requires companies to know where their data is stored and who has access to
it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details.
So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical
disaster to ‘sober up’ an industry drunk on the power of Moore's Law.
CSO staff |
14 Jun |
More Security Leadership features
R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.
George Fong |
21 Nov |
The retail industry is a prime target for fraud and data breaches – it is the second most targeted sector aside from finance.
Rick Chavie |
18 Nov |
The biggest cyber-security threat to your business is the people within it. That’s right – the same employees whom you rely on for productivity and profits are also a major weakness when it comes to protecting your operations and information.
Nicole Pauls |
18 Nov |
All of us are, to some extent, slaves to technology. Judicious use of technology is mandated. Human kind has, so far, been naïve in adopting technology with the presumption that it will always be used in the right spirit, but we have seen it being used in the wrong context over and over again. This article is about the implications of malicious use of pervasive technology.
Shantanu Bhattacharya |
13 Nov |
Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.
Steve Durbin |
13 Nov |
More Security Leadership opinons