Data Protection News, Features, and Interviews


More Data Protection news


Secure cloud backup : Review

To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty of other options out there—for your own research, and if you're not currently using a cloud backup service you may find reason to once you've seen what's on offer.

Ashton Mills | 30 Apr | Read more

Cisco impresses with first crack at next-gen firewall

When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.

Joel Snyder | 17 Jun | Read more

Review: WatchGuard XTM2050

What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.

Matt Tett | 22 May | Read more

More Data Protection reviews


In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

More Data Protection slideshows


Does DevOps hurt or help security?

There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside.

George V. Hulme | 01 May | Read more

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?

Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".

David Geer | 24 Jan | Read more

2011's biggest security snafus

Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.

Ellen Messmer | 02 Dec | Read more

Guide: How to bulletproof your website

'Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers' minds is the cautionary tale of Target, whose website crashed twice after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.

Esther Shein | 29 Nov | Read more

More Data Protection features


Accelerating cyber risk: Complacency is not an option

Every day financial services organisations deal with hundreds of thousands of indicators that could evolve into a cyber incident. According to the Australian Prudential Regulation Authority, Australian financial institutions are among cyber criminals’ top targets, and the threat is accelerating.

Sam O’Brien | 19 Mar | Read more

Recovering from a ransomware attack: Why a combined security and disaster recovery plan is key for speed

The new data breach legislation which came into effect in Australia recently means that every ‘sizeable’ organisation must comply or risk crippling fines of up to $2.1 million With cybercrime and ransomware attacks on the rise, it’s not a question of ‘if’ a data breach is going to happen, it’s ‘when’ and how quickly your organisation can get back up and running following the event.

Andrew Martin | 14 Mar | Read more

More Data Protection opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release