In pictures: Revenge is a dish best served electronically - 12 cautionary tales
These scorned IT staffers had their vengeance on their former employers -- but most got their comeuppance in the end.
30 Jan | View galleries
There is increased scrutiny by the Board and Management of business risks and potential impact of Cyber Security on operations. As the person who is responsible for hiring the new CISO, what are the key criteria that you ‘must’ have for the candidate?
Many companies have ghosts in their systems. Employees who've gone on to a better place -- say, with better pay -- but are still wandering through company files, cloud services, and social media accounts.
Maria Korolov | 04 Jun | Read more
Improving interoperability between encryption key management solutions will facilitate the use of encryption to improve governance – and prevent government intervention and hacker theft of sensitive data, a Brisbane-based intellectual property lawyer has argued in addressing a global security conference in the US.
David Braue | 03 Apr | Read more
Companies should take note of a recent poll that found contractors and IT administrators were the favorite targets of hackers.
Antone Gonsalves | 15 Aug | Read more
Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS and Google Android devices.
Ellen Messmer | 15 Aug | Read more
If you work on a computer or mobile device away from home, you probably use Wi-Fi hotspots in hotels, cafés, restaurants, airports, or on campus. The problem is, there is no way to know exactly how secure those networks are.
It used to be common for new chief security officers to come in with guns blazing. The security personality stereotype was a machismo type who wanted to be seen as the hero in saving the company’s network from all the villains trying to get in.
Ryan Francis | 14 Dec | Read more
Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.
Grant Hatchimonji | 03 Jun | Read more
Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.
Tom Kaneshige | 10 May | Read more
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.
Jaikumar Vijayan | 05 Mar | Read more
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
Eric Geier | 17 May | Read more
Today’s workplaces are becoming increasingly complex and fluid – particularly when it comes to security management. The modern worker expects to be able to work from anywhere, on any device, and at any time. Office spaces are no longer centralised with singular technology and protected by a robust firewall. They’re now wireless, with hot-desks, hybrid infrastructure (both cloud-based and on-premise), and all kinds of connectivity scenarios. Unless your flexible, digital workplace is designed with security as top of mind, security issues can very easily occur – and can have a lasting impact on your business’ overall safety.