Security Career / Staffing

News

Trend Micro A/NZ hires new managing director from global ranks

By Hamish Barwick | 19 June, 2012 12:48

Security vendor Trend Micro Australia and New Zealand has announced a replacement from within its global ranks for outgoing managing director Dave Patnaik who is leaving the company after four years.

Telstra seeks CISO to work with the Dept of Defence

By Chloe Herrick | 06 December, 2011 11:00

Telstra is on the hunt for a chief information security officer (CISO) to work primarily with the Department of Defence to oversee the development and security of its network.

Techie seeks job by using malware, blackmail

By Liam Tung | 29 November, 2011 09:11

A 26-year-old Hungarian citizen is being detained in the US for infecting the computers of hotel giant Marriott and attempting gain a job by blackmail.

Ethical hacking course offered by Coventry University

By John E Dunn | 03 November, 2011 04:03

Coventry University is to open an 'Ethical Hacking Lab', the latest UK institution to put money into developing the practical skills that have been in short supply during the cybercrime boom of the last decade.

Learn to ask the right questions on cloud security before it's too late

By David Braue | 21 October, 2011 13:54 | 1 Comment

The hard sell around cloud computing is in full swing, but many potential customers are finding it hard to evaluate the security profiles of potential providers and should take a broader view of their objectives and standards, an expert in the auditing of IT security infrastructures has warned.

CSO Corporate Partners
  • FirEye
  • Clear Swift
  • Trend Micro
  • Sophos
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Identity & Access Management

Why choose NetIQ for Identity and Access Management

Security Awareness Tip
Software security company www.clearswift.com gives some advice this holiday season to make sure employees don’t end up on Santa’s naughty list!


At a fundamental business level, social media is a useful additional tool for communicating and collaborating with customers, colleagues and new business prospects. From an HR point of view, the social web is not only useful for recruitment but also as a knowledge network. At an employee level, social media is changing the way we work: Employees increasingly expect to be able to access personal technology and services in the workplace. As the lines between work and home life blur, staff are looking for greater flexibility in their roles; working from home is an increasing trend, but so too is ‘home-ing from work’, where staff expect to be able to perform personal tasks at work.

But social media brings risk and reward to business in equal measure. Information security is a key concern: Many organisations view social media channels as yet another route along which sensitive data can escape from the business, whether accidentally or maliciously. On top of this, senior management may be concerned about the amount of time employees spend on social networks.

This cultural shift raises new questions about trust in the workplace, the balance of power in employer / employee relationship and levels of control over people and content.


Organisations using content and web security technology can manage the way their staff use email and the internet without having to resort to a default position of mistrust. With a whopping third of ANZ employers completely blocking social media access at work, there’s a real danger of throwing the benefits of collaboration out with the risks.


It doesn’t have to be that way.

Trust breeds responsibility: People underestimate the amount of company time they spend on personal browsing. Allow staff to view their own web usage and foster more responsible behaviour without undermining trust.


Know limits: Set clear limits on personal surfing and communicate them to users. Alert them when they are approaching their limit. Help your people to play by the rules.


Share the load: Spread responsibility for usage reporting among managers and department heads so everyone gets to see how their usage impacts on the rest of the organisation. This also gives managers greater control and visibility into usage.


Need to know: Yes, you need reports and visibility. What you don’t need is employee data becoming common knowledge. Access control means reporting can be adjusted on a need-to-know basis.


Security ABC Guides

7 Ways to Protect Your Business Printers

Can a hacker burn down your business by remotely setting one of your printers on fire? Researchers at Columbia University have recently proposed such a scenario, although HP quickly denied that it's possible. However, even if your printers can't be used as remote firestarters, there are many risks involved in networking a printer.