Opinions — News

How to ace the CISO interview – be ready for the tough questions

Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.

Taylor Armerding | 06 Oct | Read more

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

Security threats through the Cloud

As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

Gordon Makryllos | 24 Sep | Read more

Hacked - The perfect attack

Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.

Dr Claudia Johnson | 26 Jun | Read more

How to stay protected for Heartbleed and other OpenSSL flaws

Heartbleed wasn't just an interesting Internet security story. It was a sign that one of the most fundamental building blocks relied on by many large companies was significantly flawed. Even more staggering was the revelation that the OpenSSL open source code library, that is responsible for SSL communications between systems, had another flaw that went undetected for over a decade.

Anthony Caruana | 24 Jun | Read more

Cyber threats makes it to number 4 on the Global WEF Agenda

A recent report released by the World Economic Forum (WEF) focused on the Global Agenda for 2014 and the top 10 trends facing the world. As one might expect, topping the list were globally pertinent and vital topics like; growing societal tensions in the Middle East and North Africa; income disparity around the world; and ongoing unemployment.

Gordon Makryllos | 20 Jun | Read more

I've got my eye on you: Google Glass

Every time a revolutionary technology comes into being, basic questions such as 'do we really need this technology?' or 'how can we ensure that new technology can be put to right use?' will give raise to concerns about privacy and security.

Dushyant Sattiraju | 28 May | Read more

The switch to IP cameras is on – and it's hard

The physical security world has been in the midst of a significant change over recent years. Old security cameras, that could be connected with a coaxial cable and some power, are giving way to IP enabled devices. This has lead to a complete rethink on how security systems are designed, deployed, operated and maintained.

Anthony Caruana | 10 Apr | Read more