Security Leadership News, Features, and Interviews

News

The week in security: Tech giants defend encryption; Smart TVs a security soft spot

With peak retail season settling down, many were weighing the damage that hackers had wrought in recent weeks. After Hyatt Hotels said its payment-processing systems had been hit by malware, others were warning that payment terminals were often affected by poor security decisions that enabled mass fraud by hackers. Authorities dismantled a gang of criminals that had stolen 200,000 euros from ATMs infected with malware, while online vandals were said to have set a DDoS record after pummeling the BBC Web site.

David Braue | 12 Jan | Read more

Qld crime inquiry recommends police “infiltrate” online drug gangs, boost penalties for crims using Dark Web

Criminals who use the Internet for drug crimes, fail to provide their passwords to police or use online anonymising services for child exploitation, would attract additional sentences under a host of Queensland Organised Crime Commission of Inquiry (QOCCI) recommendations that also include suggestions that the Queensland Police Service (QPS) train cybercrime investigators to monitor and “infiltrate” the online drug trade.

David Braue | 06 Nov | Read more

More Security Leadership news

Reviews

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Security Leadership reviews

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

More Security Leadership slideshows

Features

More Security Leadership features

Opinions

Aussie Firms Must Play Catch Up or Will End Up as Easy Targets

“This week, it was announced the federal government is putting through a new bill which obliges about 1600 Telco’s and related companies to protect their networks from unauthorised access and interference. Breach notification laws have been highly effective at forcing organisations to review IT Security in countries such as the USA and Europe.

Phillip Simpson | 01 Jul | Read more

More Security Leadership opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place