How CIOs should respond to a data breach
How prepared is your organisation to deal with the fallout from a cyber attack?
How prepared is your organisation to deal with the fallout from a cyber attack?
Cost of data breaches in the spotlight.
Richard Wells of MinterEllisonRuddWatts lists eight steps to managing data risks and protecting personal information.
As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.
A decade after the Love Bug virus attacked millions of computers worldwide and put the Philippines in the IT world map in a negative way, computer security experts have noticed that today's computer attacks are more malicious than the original computer security threat.
In its April 2010 security report, Symantec said it has detected 36,208 unique strains of malware that were designed to carry out targeted attacks.
In contrast to the spectacular computer virus outbreaks four years ago, today's attacks are subtle, discreet, carefully targeted and designed to stay below the radar of official security agencies.
One form of these silent yet all-pervasive attacks involves marshalling unprotected home computers into unwitting electronic slave networks called botnets.
The 2007 Global State Of Information Security Survey conducted by CIO, CSO and PricewaterhouseCoopers is the largest security survey to include New Zealand companies. The survey reached out to nearly 10,000 organisations from 119 different countries.
As such, it represents a comprehensive view of security issues, practices, budgets and concerns around the globe and gives us an in-depth context in which to view our domestic results.