The Australian Information Security Association (AISA) National Conference 2011, to be held on 9 November in Sydney, is set to be a standout event that will help drive future directions for Australia's information security industry.
CSO staff |
19 Aug |
Read more
Following several executive leadership changes earlier this year, Houston-based holding group Attachmate has promoted Martin Mooney to Country Manager, New Zealand.
CSO staff |
18 Aug |
Read more
The SecureCloud Advantage
CSO staff |
29 Jul |
Read more
Security Expert Rich Mogull on Mobile Device Data Protection
CSO staff |
14 Jul |
Read more
Achieving PCI Compliance in Complex Environments
CSO staff |
14 Jul |
Read more
Recent attacks on HB Gary and RSA are evidence of Bruce Schneiers recent comment that “attacking a network is much easier than defending a network” and that “there might someday be the cyberspace equivalent of trench warfare, where the defender has the natural advantage”.
CSO staff |
13 Jul |
Read more
Complexity comes in many forms, says Cisco’s chief security officer, John Stewart, who rates the
speed of change as his top challenge.
CSO staff |
18 Jun |
Read more
HD Moore, CSO of Rapid 7 explains why engineers are more dangerous than salespeople and why
email security companies are laughing all the way to the bank.
CSO staff |
17 Jun |
Read more
If the number of devices talking to your network was about to increase from 50 to
850,000, you might be a little daunted. One person facing precisely this nightmare is Ian
Appleby, corporate IT security manager for NSW energy distributor, Endeavour Energy.
He sums up his greatest challenge in three words: New emerging technologies.
CSO staff |
18 Jun |
Read more
Operating in a hyper-connected world, the major concern that is foremost on the CIO's priority
list is security. The emergence of convergence technologies, mobility and new delivery models like cloud
has only further spurred the growth in security.
CSO staff |
17 Jun |
Read more
Why is it such a struggle to work in security? Show me a security professional who
hasn’t felt misunderstood and undervalued. Who hasn’t complained that they are treated like a pariah?
What are we missing? Is it our fault or is the world not ready for us yet? Does a major
security breach have to happen before the penny drops?
CSO staff |
14 Jun |
Read more
To use Cloud computing securely requires companies to know where their data is stored and who has access to
it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details.
So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical
disaster to ‘sober up’ an industry drunk on the power of Moore's Law.
CSO staff |
14 Jun |
Read more
Security analysts have been predicting the emergence of mobile malware for many years.
In 2011, the criminals have finally come through by attacking Google's popular Android
OS. Meanwhile, the sophistication of Stuxnet — anasty piece of code that infected a nuclear power
facility — has alarmed researchers who believegovernments are stockpiling tools for cyberwar.
Looking ahead, it seems a cataclysmic Cloud failure is just around the corner.
CSO staff |
14 Jun |
Read more
The CSO Security Buyers Guide 2010 digital edition is now available for download. Download this digital magazine (PDF) for reviews, interviews, company profiles, and more security research resources.
CSO staff |
10 Jun |
Read more
<em>These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted in 2000 after the organization received a threat </em>
CSO staff |
19 Aug |
Read more