
The CSO identity management survival guide
Identity management, as Gartner defines it, is the "security discipline that enables the right individuals to access the right resources at the right times for the right reasons.
Identity management, as Gartner defines it, is the "security discipline that enables the right individuals to access the right resources at the right times for the right reasons.
Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.
David Braue | 21 Jul | Read more
The Canonical-backed Ubuntu Linux project has released its single sing-on authentication software as an open source project.
Rodney Gedda | 22 Apr | Read more
Microsoft plans to buy health-care software maker Sentillion for an undisclosed sum in order to expand its own health-care offerings and capitalize on an upcoming opportunity for new sales.
Nancy Gohring | 11 Dec | Read more
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities