Stories by CSO staff

CSO staff's image

Changing the enterprise security landscape

The headlines may be filled with cyber-attacks and government-level efforts to boost IT security, but for the average CIO, 2013’s security challenges revolve around the myriad threats posed by ever more powerful business agendas. The explosion in demand for bring-your-own-device (BYOD) policies and the maturation of cloud computing, in particular, are escalating IT security to the highest levels of the executive.

CSO staff | 17 Sep | Read more

BYOD security needs total user management : LANDesk

The rise of bring your own device (BYOD) policies has forced CSOs and IT executives to reconsider long-held notions about control over user devices and their access to information resources based on their identities. CSO spoke with Alan Abraham, Australia and New Zealand country manager at LANDesk, who believes an integrated user management environment offers the best way to manage the explosion of devices in today’s enterprise – and tomorrow’s.

CSO staff | 29 May | Read more

AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation

Although web application attacks have existed for over the last 10 years, simple coding errors, failed input validation and output sanitization continue to exist in web applications that have led to disclosures for many well-known companies. The most prevalent web application attacks are SQL Injection, Cross Site Scripting and OS Command Injection. With an increased number of companies conducting buisness over the Internet, many attackers are taking advantage of lax security and poor coding techniques to exploit web applications for fame, notoriety and financial gain.

CSO staff | 23 May | Read more

AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion

Although web application attacks have existed for over the last 10 years, simple coding errors, failed input validation and output sanitization continue to exist in web applications that have led to disclosures for many well-known companies. The most prevalent web application attacks are SQL Injection, Cross Site Scripting and OS Command Injection. With an increased number of companies conducting buisness over the Internet, many attackers are taking advantage of lax security and poor coding techniques to exploit web applications for fame, notoriety and financial gain.

CSO staff | 23 May | Read more

Evolve Security Conference 2013 rolling coverage

What a time to be in the IT industry - right now technology is changing almost every aspect of our lives, and as IT professional we have front row tickets! The decisions we make today will be felt for years to come by the organisations we work for, their owners, their customers, and their partners. (Sanjay Mehta)

CSO staff | 14 May | Read more

Australia lags in online security awareness

An online survey of IT managers polled more than 2000 companies, each with 500 or more employees, in several countries—Australia, Canada, the United States, Germany, UK, France, Brazil, and India. 225 firms were surveyed in Australia.

CSO staff | 21 Dec | Read more

What IT security professionals can learn from Click Frenzy

Aside from the hard lesson learned that failure to plan and prepare will most certainly lead to disaster, there are some important lessons on governing and best practice implementation security professionals need to take from the Click Frenzy event, according to cloud computing and security experts.

CSO staff | 27 Nov | Read more