Top IT Security Bloggers

Earthwave - un-earthed
  • The difference between intelligence and common sense

    Earthwave - un-earthed
    Under construction – photo of new ASIO site taken from an ABC News helicopter My kids love the story of the “tortoise and the hare”, where over confidence brings the hare undone and dogged persistence brings about the unlikely success of the tortoise.The parallel with the contest between ASIO and Chinese hackers will probably be [...]
  • White hats and white lies

    Earthwave - un-earthed
    Recently, a number of CISOs became outraged when security researchers from Mitre, the maintainer of the Common Vulnerabilities and Exposures (CVE) database, suggested that the best approach to dealing with Advanced Persistent Threats (APTs) might be to “lie to attackers”. A debate ensued about ethics and security. The point is, I think “lie” is a strong word. If [...]
  • White hats and white lies

    Earthwave - un-earthed
    Recently, a number of CISOs became outraged when security researchers from Mitre, the maintainer of the Common Vulnerabilities and Exposures (CVE) database, suggested that the best approach to dealing with Advanced Persistent Threats (APTs) might be to “lie to attackers”. A debate ensued about ethics and security. The point is, I think “lie” is a [...]
  • White hats and white lies

    Earthwave - un-earthed
    Recently, a number of CISOs became outraged when security researchers from Mitre, the maintainer of the Common Vulnerabilities and Exposures (CVE) database, suggested that the best approach to dealing with Advanced Persistent Threats (APTs) might be to “lie to attackers”. A debate ensued about ethics and security. The point is, I think “lie” is a strong word. If [...]
  • Big News, Bigger Future: What’s Next for earthwave

    Earthwave - un-earthed
    Carlo Minassian, Founder & CEO, earthwave This blog post has been a very long time in coming, and I am happy to say, it is all good news. By now, you might have heard that earthwave has been acquired.  As of May 1, 2013, earthwave is proud to be a Dimension Data company. Selling earthwave was [...]
  • Data breach notification loopholes

    Earthwave - un-earthed
    Other than ultimate victory, one of the most celebrated moments in a game of Monopoly is when one of your opponents with more properties than you, receives those all too familiar instructions, “Go directly to jail; do not pass go; do not collect $200″. You finally get a chance to play catch up and build [...]
  • Where are the Pens?

    Earthwave - un-earthed
    What is the similarity between a BIC biro with a USB drive? BIC is synonymous with the commodity goods that you use and throw away, lighters and razors to name two. But the humble BIC biro is something you tend to not throw away because, well they just seem to go away. It is not [...]
  • There are Two Types. Are you one too?

    Earthwave - un-earthed
    An ‘inkling’ may sound like a wee bit of writing, but it means you know more than was written…..  A while ago we posted about the ‘Joy of Stats’ which looked at the value of Big Data analytics and also noted that we must rationalise automated outputs to ensure we don’t assume that Swedes have [...]
  • earthwave CEO, Carlo Minassian, interviewed by BRW

    Earthwave - un-earthed
    Carlo talks about the new cyber threats and why your IT security is failing  
  • Why Australia needs to embrace “cybersecurity civil defence”

    Earthwave - un-earthed
      Why Government Is So Worried About Cybersecurity That It Is Willing to Upset The Voters To Do Something About It.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Secure, identity-based protection for your endpoints

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.