Although BYOD security gets the headlines, IT managers find issues like device management, scope management and support just as challenging.
At the recent CSO Australia Mobile Security roundtable, held at AusCERT, 21 guests thrashed out their experiences and concerns.
Richard Chirgwin |
07 Jun |
Read more
Dissent is always more enjoyable than conformity. Not only does it make a better story for a journalist, it occasionally forces people to think.
Richard Chirgwin |
24 May |
Read more
Mozilla Persona had one of its first conference Australian outings at AusCERT 2013, with software engineer on the project, New Zealand-based Francois Marier's tutorial on the architecture of the identity project.
Richard Chirgwin |
24 May |
Read more
Get used to hacktivism, because we're stick with it – but whether it fits the media image of “Anonymous”, or how long Anonymous as it first emerged will continue, is a different question. That's the message from Forbes' Parmy Olsen, author of <i>We Are Anonymous: Inside the Hacker World of Anonymous, LulzSec and the Global Cyber Insurgency</i>, speaking to AusCERT 2013.
Richard Chirgwin |
24 May |
Read more
Dr Lizzie Coles-Kemp is a senior lecturer in the Information Security Group, Royal Holloway University of London. She is keenly interested in how social behaviours influence our attitudes to security. For example, in communities where Internet accounts need to be shared between family members, the security professional's assumption that one account and password identifies one person is undermined. CSO spoke to Dr Coles-Kemp about the nexus between social behaviours and information security.
Richard Chirgwin |
24 May |
Read more
Data is at its most valuable just after it's created, and vulnerability data in particular has a short half-life, says Packetloop's Michael Baker.
Richard Chirgwin |
24 May |
Read more
In a security industry that hasn't changed much in 20 years, SafeNet's Andrew Younger says, it's strange that nothing much has changed in that time – except that we keep failing.
Richard Chirgwin |
23 May |
Read more
It's time for a debate about the kinds of actions that infosec professionals are allowed to take against attackers, according to CrowdStrike co-founder and CTO Dmitri Alperovitch.
Richard Chirgwin |
23 May |
Read more
HP's Colin Henderson believes the security industry needs to become more adept at understanding the role of big data in security analysis, to try and stay ahead of an increasingly sophisticated and collaborative “black hat” world.
Richard Chirgwin |
22 May |
Read more
Trend Micro has given an overview of its Deep Discovery environment for Australian customers at its Evolve 2013 security conference in Sydney.
Richard Chirgwin |
14 May |
Read more
In a world that's only starting to agree on what defines “software defined networking”, it may sound surprising that VMWare believes the “SD” initials can be put in front of “data centres”—that's what the virtualisation vendor was putting forward at the Evolve 2013 Security Conference in Sydney.
Richard Chirgwin |
14 May |
Read more
The combination of the shift towards mobile platforms for access, and the growth of social media for applications, is creating a “fantastic avenue” for undermining corporate network security, according to Frost & Sullivan.
Richard Chirgwin |
14 May |
Read more
It's high time for enterprises to stop viewing backup and business continuity as separate from their security environment, according to Telsyte analyst and former journalist Rodney Gedda.
Richard Chirgwin |
27 Jul |
Read more
We're all familiar with the notion that perimeter is disappearing from IT systems – but it's not a new phenomenon. In fact, the perimeter has been dissolving for years, says NetIQ's Ian Yip.
Richard Chirgwin |
26 Jul |
Read more
Businesses are losing patience with IT at the worst possible time: just when companies are becoming more aware of enterprise risk.
Richard Chirgwin |
26 Jul |
Read more