How CIOs should respond to a data breach
How prepared is your organisation to deal with the fallout from a cyber attack?
How prepared is your organisation to deal with the fallout from a cyber attack?
Cost of data breaches in the spotlight.
Richard Wells of MinterEllisonRuddWatts lists eight steps to managing data risks and protecting personal information.
As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.
A decade after the Love Bug virus attacked millions of computers worldwide and put the Philippines in the IT world map in a negative way, computer security experts have noticed that today's computer attacks are more malicious than the original computer security threat.
In its April 2010 security report, Symantec said it has detected 36,208 unique strains of malware that were designed to carry out targeted attacks.