7 tips to becoming a successful CISO
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
Even weak attackers can pull off a password reset man-in-the-middle attack by getting you to register at a new website.
Australian consumers are still pretty poor at securing their information but those same consumers are unforgiving of businesses that do the same, a new study suggests. Similarly, breaches of online megalith Yahoo had caused its acquisition by Verizon to be pushed back, reports suggested.
David Braue | 30 Jan | Read more
A suspected Russian hacker arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says.
Michael Kan | 20 Oct | Read more
A Russian citizen arrested by Czech police on Wednesday is a key suspect behind a breach at LinkedIn that affected 117 million accounts.
Australian business executives are proving to be desirable targets for scammers that have been remarkably successful at using business email compromise (BEC) (also known as 'whaling') schemes to wring millions of dollars from unwitting victims. Yet even as they struggle to clamp down on losses to scammers breaches of the so-called human firewall, those same businesses are also becoming key contributors to efforts to stop BEC in its tracks.
David Braue | 19 Sep | Read more
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
Everyday can be a D-Day for me and I love to celebrate success, no matter how small it is!
First thing I do every day is check email and LinkedIn; normally on the train. I like to get this touch base out of the way before I get into the office so I can map out a plan for my day.
In part 1, I addressed why firms struggle to find quality information security staff. In this segment, I’ll discuss how recruitment can help or hinder that, and get insights from noted information security recruiter Tracy Lenzner.
Ben Rothke | 09 Nov | Read more
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Jaikumar Vijayan | 15 May | Read more