Australian businesses need to stop talking about diversity and undertake concrete steps to remedy the chronic under-representation of women and minority groups within ICT roles, an Australian Computer Society (ACS) executive has warned as figures suggest that efforts to attract women to ICT-related roles continue to flounder.
David Braue |
24 Feb |
Read more
It took years of discussion and several revisions, but experts believe the long-awaited passage of Australia’s breach notification legislation will kick off a new era of transparency that will rapidly improve understanding of the country’s real cybersecurity threat climate.
David Braue |
15 Feb |
Read more
Even as one-time Internet giant Yahoo is swallowed in a $6.5 billion acquisition, merger and acquisitions (M&A) experts have warned that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance and could threaten the merger and acquisition activities.
David Braue |
01 Aug |
Read more
Only 54 percent of workers believe their employers have given them adequate training about how to preserve the privacy of customers' personally identifiable information (PII), a new survey has found as privacy authorities spruik a new privacy management framework designed to help Australian organisations improve privacy compliance efforts that have been slammed as inconsistent and unbelievable by consumers.
David Braue |
08 May |
Read more
Google and others have called for all websites encrypt traffic to and from browsers, but the task for publishers is a tricky one, largely because of online advertising.
Liam Tung |
26 Mar |
Read more
For all the talk about the importance of new security technologies, the importance of staff buying into corporate security strategies is often underestimated. In every case, the predictable result is the same: a strong technological barrier whose effectiveness is immediately compromised once a legitimate user, with legitimate access to internal resources, clicks on a phishing email designed to load malware onto their computer.
David Braue |
12 Mar |
Read more
Systems developers need to stop blaming users for security shortcomings and focus on improving security by rebuilding their systems in a more secure and user-friendly manner, a security expert has argued.
David Braue |
06 Mar |
Read more
Managed security services (MSS) providers are set to enjoy growing demand from enterprise customers as increasing pressure to stay on top of security threats pushes them to enlist outside help, according to the newly appointed head of Dell SecureWorks.
David Braue |
16 Feb |
Read more
It's hard enough to make sure employees don't walk out the door with your corporate data in hand – but with a growing tide of sentiment suggesting encryption is actually a potential problem,what's a CSO to do?
David Braue |
09 Feb |
Read more
On the heels of two real Flash Player security updates being distributed by Adobe Systems this week, hackers are spreading a fake update for the media player via a scam on Facebook that has exposed at least 5,000 users to the threat.
Liam Tung |
27 Jan |
Read more
Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.
George V. Hulme |
23 Jan |
Read more
Researchers have proven the Heartbleed OpenSSL bug can be used to extract private keys from a vulnerable web server, giving affected services concrete evidence they do need to revoke and reissue private SSL certificates.
Liam Tung |
14 Apr |
Read more
Specialist recruitment giant Peoplebank is seeing significant time savings after implementing a digital signature system that has significantly improved its everyday work processes.
David Braue |
02 Apr |
Read more
A three-year, $15 million managed security services (MSS) contract under which the Australian Federal Police (AFP) will outsource its security monitoring and management to Verizon marks a significant milestone in the federal government’s significant security gateway reduction program, Verizon senior security manager Jason White has pointed out.
David Braue |
11 Jul |
Read more
2012 has been a tough year for IT security and the trend seems to be continuing into 2013. We have now become accustomed to groups such as Anonymous that have wreaked havoc on a number of large government and corporate organisations. A new frontier in cyber threats has opened. The driver for cyber intrusion is no longer fame, but theft of intellectual property, financial information, blueprints and other classified information for financial gain.
Ashwin Pal |
10 Jul |
Read more
Unixpac now represents LockPath,a Kansas US based solution vendor, provider of the most innovative governance risk and compliance applications (GRC).
CSO staff |
05 Sep |
Read more
The trusty telephone is emerging as one of the key elements in new multifactor authentication schemes designed to protect online banking and other web-based financial transactions from rapidly evolving <a href="http://www.networkworld.com/topics/security.html">security</a> threats.
Julie Sartain |
07 Feb |
Read more
I had the opportunity to speak at a new security conference last week, Security Threats 2012. I presented on the topic of balancing business benefits with risks in the cloud (more on that later), but the event touched on a wide range of pertinent IT topics, provoking stimulating discussions of some of the most pressing challenges business leaders are facing.
Bernard Golden |
03 Feb |
Read more
With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor <a href="http://www.cbsnews.com/8301-501465_162-57365004-501465/judge-americans-can-be-forced-to-decrypt-their-laptops/">US District Court ruling</a> on fifth amendment password protection rights, it is time you actually encrypt your data properly.
Ben Rothke and David Mundhenk |
02 Feb |
Read more
GM subsidiary OnStar's plan to collect and share GPS tracking and other data from vehicles even after their owners stop subscribing to its service has prompted an outcry from some lawmakers.
Jaikumar Vijayan |
27 Sep |
Read more