Corporate Partners

Security Leadership News, Features, and Interviews

News

Small, unsophisticated developers perpetuating IoT security lapses: IBM

Despite years of education about security threats, software developers in Australia and elsewhere are still writing code that is too insecure and will open up massive holes as the Internet of Things (IoT) develops, IBM's X-Force security arm has warned as a prologue to recent research that found most malware threats continue to come from outside of Australia but can nonetheless affect all countries.

David Braue | 26 Nov | Read more

The week in security: iappANZ weighs privacy progress; Obama, industry fight government spying

Privacy Commissioner Timothy Pilgrim released a new Privacy Regulatory Action Policy as the iappANZ Privacy Summit kicked off. Also instructive on the policy front was Scotland's National Health Service, which shared its experience meeting healthcare privacy requirements with attendees. Vodafone's head of privacy was also on hand, pointing out that economics is playing an increasing role in discussions about the risks of privacy.

David Braue | 25 Nov | Read more

More Security Leadership news

Reviews

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Security Leadership reviews

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

More Security Leadership slideshows

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

Cloud security: how to protect your data

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

CSO staff | 14 Jun | Read more

More Security Leadership features

Opinions

Five predictions for IdaaS and Identity Management in 2015

Five years ago we knew changes in technology and the ways in which we do business would present enormous challenges for how IT manages identity, what we didn’t know, was just how fast these changes would take place. By 2015 Gartner forecasts Identity as a Service (IDaaS) will make up 25 per cent of the Identity and Access Management (IAM) market, up from just four per cent in 2011.

Graham Pearson | 28 Nov | Read more

SOFTWARE-DEFINED NEUTRALISATION OF CYBER RISKS

Putting a strong lock on a weak door is unlikely to deter thieves, particularly when there are valuables inside. Yet all too often in the battle against cyber attacks, businesses do just that: they attach advanced digital security systems to inherently insecure corporate network infrastructures. The net result is enterprise IT capabilities that keep those tasked with maintaining risk registers and ensuring data security awake at night, and frustration for those who want to embrace next generation mobility and cloud technologies to generate efficiencies and competitive advantage.

John Suffolk | 24 Nov | Read more

Peeling back the darknet

Most organisations are unaware of the need to bring darknet expertise in-house to ensure that there will be no surprises bubbling out of the darkness. The darknet does not have a pretty face, but it is not entirely evil either; so what is it that your organisation should know about the darknet, and why?

Mark Gregory, RMIT | 24 Nov | Read more

R.I.P. Email?

R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.

George Fong | 21 Nov | Read more

More Security Leadership opinons

Market Place