Join the Community

21,041
Expert opinions
43,887
Total members
302
New members (last 30 days)
114
New opinions (last 30 days)
28,298
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

Those embarrassing little - and not so little - leaks

Interestingly, this was exactly the topic of conversation at a couple of CIO / CTO level Information Security dinners that we have hosted in the city recently, and follows hot (OK, warm) on the heels of the FSA's Market Watch newsletter on Market Conduct and Transaction Reporting Issues, with accidental leaks of sensitive information being a key i...

/security /regulation

Retired Member

Retired Member 

Top 100 Network Security Tools

Fyodor, the author of the popular Nmap FOSS for network exploration or security auditing, has released the list of the top 100 network security tools (excluding Nmap). He has compiled the list based on the responses from 3,243 people in the Nmap mailing list. Relating to my post on the malware attack on BoI, I think that the sysadmins of the bank...

/security

Retired Member

Retired Member 

Fallen Citadel: Malware Attack on Bank of India

Story URL: http://www.theregister.co.uk/2007/09/01/bank_of_india_website_takeover/ The recent, crippling, malware attack on the website of Bank of India (http://www.bankofindia.com) is a stark reminder of how far away are the banks from offering secure net banking facilities. Obviously, BoI is not the only bank to suffer from a security lapse; mo...

Retired Member

Retired Member 

The Insider Threat

Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a growing awareness of the need to control outbound information flow as well as inbound? Certainly there have been more press articles on this topic of...

/security

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

HSBC Australia shoots the messenger

Banks and their customers have very different ideas about what constitutes "sensitive data", and what communication should take place if data security is compromised. And one bank in particular has an interesting approach to managing the media fall-out when such a lapse occurs. Over the past 6 weeks, a journalist at Computerworld Austr...

/security /retail