Data Priacy — News

The week in security: hackers banking on human, technological shortcomings

The US government is on the verge of announcing a winner for its competition to build a new cryptographic hash algorithm – but not everyone thinks it's necessary. Current encryption can do the job nicely and – in the case of some cloud-computing services – for free. Cloud providers are responsible for your personal data when it's loaded into cloud services, but encrypting it may prove valuable if you're not entirely convinced.

David Braue | 04 Oct | Read more

The week in security: Companies pressured to act on breaches

News of new security breaches continued to roll in throughout the week, with the Australian Securities and Investments Commission (ASIC) kicking off the week with a warning that users of online stockbroking services should review their security, change their passwords, and ensure all software was current. Seems someone has been poking their heads where they shouldn't be, and ASIC is eager to prevent any more unwanted intrusions.

David Braue | 30 Jan | Read more

The week in security: A bitter bar of SOPA

While much of the online world followed Wikipedia’s unprecedented SOPA legislation protest, security concerns provided a more definitive solution as the Obama administration promised to veto SOPA on the basis that it would push people to “dangerous, unreliable DNS servers” and compromise secure improvements like DNSSEC.

David Braue | 20 Jan | Read more

Security Operations the Final Frontier – Part III

Security Operations, as a capability, was discussed in the first article of this series: Security Operations the Final Frontier. This was a response to media coverage of a other operations in which information was compromised and data assets were stolen - Operation Shady RAT, Operation Aurora and Operation Night Dragon.

Puneet Kukreja | 20 Dec | Read more

Are users the weakest link in the security chain?

IT departments often write users off as being of low importance, but they actually have a primary role to play in corporate security. Experts agree that overall security is only really equal to the security of its weakest link – and when it comes to corporate security, that link is the user.

Gordon Makryllos | 20 Dec | Read more

Expect conflict in 2012 as consumerisation raises security alarm bells for CIOs

End users everywhere are demanding that IT executives figure out how to let them bring their own smartphones and laptops to work. Yet even as consumerisation tops lists of IT priorities for 2012, vendors are taking new approaches to security as a majority of CIOs worry that the BYO pendulum has swung too far and will, through the normalisation of off-net mobility, create new business risks due to unaddressed shortcomings in management and security strategies.

David Braue | 19 Dec | Read more