Information security spending to grow almost 10% in ANZ: Gartner
Detection, response and privacy drive demand for security products and services
Detection, response and privacy drive demand for security products and services
But majority says a data breach is not likely at an airline, healthcare provider or utility firm, reports Unisys
Each year, the Information Security Forum, a non-profit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top 9 threats to watch for through 2017.
Crime fighting software to help 92 police agencies and selected FBI agencies to fight Felony Lane Gang Identity Theft Ring
The Internet of Things is a big theme – again - at this year’s CES. Constellation Research analysts weigh in on how this connectivity can change lives, and the steps needed across industries to make this happen.
The majority of New Zealanders are equally concerned about data security, regardless of whether information is stored within the national borders or overseas, a Unisys survey has found.
Symantec project aims to plug continuous skills gap in the area.
Computer Emergency Response Team (CERT) Australia has called for more Australian organisations to report cyber security issues to the police following the results of its annual survey.
Many enterprises around the world think they are prepared for cyber attacks but the reality is that any organisation is at risk of a security breach, consulting firm Deloitte has warned.
Information security is often seen as more trouble and cost than it's worth. Until it fails. How can CIOs truly make it part of enterprise risk management?
Tax deductions, photo albums and Web source codes were just some of the kinds of personal information Sophos found on 50 USB keys purchased in a RailCorp lost property auction in Sydney.
A panel of security experts agreed that security needs to thought of a lot earlier in the software development lifecycle, and that the IT industry needs to start shipping "hardened" products, especially with the advent of the cloud and visualisation making the location of sensitive data even more difficult to locate.