Security Industry News, Features, and Interviews

News

Australian businesses should use ASD Essential Eight as a roadmap for proactive security

Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?

David Braue | 08 Jun | Read more

More Security Industry news

Slideshows

IDG Security Day: Sydney infosec leaders

And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.

Abigail Swabey | 23 Jun | Read more

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

Barack Obama’s security circus arrives in Oz: In Pictures

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified. Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Neerav Bhatt | 18 Nov | Read more

More Security Industry slideshows

Features

The changing role of a the CISO

Michael Sutton is the CISO of ZScaler. He has forged a long career working in information security and has seen many changes over the years. We spoke to him at AusCERT 2016 about his career, the changing role of the CISO and what he’s seeing in the world of infosec.

Anthony Caruana | 27 May | Read more

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

Cloud security: how to protect your data

To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.

CSO staff | 14 Jun | Read more

More Security Industry features

Opinions

​Adaptive Security Architecture: Enhancing Your Security

Today, an array of ‘Security Innovation’ is happening. There has never been a time where there is more security innovation, and more security spend, as companies and corporations face greater chances of being cyber attacked. There is a new world we must secure - devices, apps (traditional and cloud native) and the cloud (managed, private and public).

Nathan Lowe | 18 May | Read more

5 reasons why using a VDC (Virtual Data Centre) can improve your organisations Physical and Logical Security

A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure.   With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways

Gerardo Altman | 19 May | Read more

Five Ways to Reduce the Cost and Complexity of Cyber Security

If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.

Paul Lipman | 28 Apr | Read more

More Security Industry opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place