IT leaders and security chiefs gathered together at Aria Restaurant in Sydney on 3 June to discuss how they are addressing the challenge of cyber resilience and what it takes to be prepared.
CIO Staff |
23 Jun |
Read more
A Risk Register, also referred to as a Risk Log, is a master document which is created during the early stages of your project. It is a tool that plays an important part in your Risk Management Plan, helping you to track issues and address problems as they arise.
CIO Staff |
19 Sep |
Read more
Payment Card Industry (PCI) Data Security Standards (DSS) refer to a set of standards that must be followed by big and small businesses alike when accepting, storing, processing and transmitting customers’ credit card information. To be compliant with PCI standards, all business owners, including online retailers, should adhere to 12 PCI compliance requirements for best security practices.
CIO Staff |
09 Sep |
Read more
Businesses of all sizes must undertake PCI compliance auditing to ensure that their customers' data is protected during credit or debit card transactions and if stored within any internal business databases.
CIO Staff |
09 Sep |
Read more
If you're business is obliged to undertake a PCI audit, then following a PCI Compliance checklist will ensure that you're security processes and payment processing meet the compliance standards. To ensure that you are meeting PCI compliance standards, you'll need to start by looking at what exactly PCI compliant means.
CIO Staff |
09 Sep |
Read more
If you operate, own or hold a management role in an Australian business that stores, transmits and processes customer payment data, you may have recently been contacted by your bank regarding your PCI compliance status.
CIO Staff |
09 Sep |
Read more
If you're wondering exactly what is PCI compliance, the chances are you're one of the many business owners in Australia who've asked themselves this same question. Before answering this question, it's useful to begin by looking at what PCI (and its counterpart DSS) stands for.
CIO Staff |
09 Sep |
Read more
What a different global economy this would be if it were only a little bit more like the cloud. As the financial markets go through their bipolar mood swings with every wrenching headline, the market for cloud services has marched steadily upward and onward, seemingly unfazed by the concerns of the non-virtual world.
CIO Staff |
24 Aug |
Read more
RSM Bird Cameron’s director of information security, Jo Stewart-Rattray, has picked up the coveted National ICT Professional of the Year gong at the 2011 iAwards in Melbourne.
CIO Staff |
05 Aug |
Read more
The Manly Sea Eagles announced a new major sponsor, IT security company, Kaspersky Lab.
CIO Staff |
07 Jul |
Read more
Cloud computing is one of the most significant technological trends we have witnessed and has the potential to change the very way we work. It is, however, important for CIOs to understand that we are currently in a pre-standard era of cloud computing and as such, each organisation needs to be mindful of the myriad of security issues surrounding the cloud. Patrick Eijkenboom, principal consultant at NetIQ, suggests taking a measured approach and asking five security questions before jumping into the cloud.
CIO Staff |
08 Apr |
Read more
The Cloud’s promise of on-demand, agile computing is undeniably compelling. The trick is being able to align those services with your own business and IT strategy.
CIO Staff |
25 Mar |
Read more
M86 Security has released its latest Security Labs Report which details the emergence of combined attacks that leverage Adobe’s ActionScript and JavaScript languages to thwart most of the new, proactive detection mechanisms.
CIO Staff |
15 Jul |
Read more
The reputations of organisations are taking a beating in social media, with consumers going so far as to boycott companies based on comments made on sites such as Facebook and Twitter, a new survey has found.
CIO Staff |
01 Sep |
Read more
Cyber criminals have changed tack in their ongoing scam campaign against banks, moving to the use of government agencies to gain the trust of unsuspecting email recipients.
CIO Staff |
03 Jul |
Read more