How to balance cloud investment risk
The C-suite and boards of directors often think about investment decisions under three key pillars – Will this decision make money? Will it save money elsewhere? And what is the risk?
The C-suite and boards of directors often think about investment decisions under three key pillars – Will this decision make money? Will it save money elsewhere? And what is the risk?
The cyber security industry has an image problem which is turning off capable candidates from pursuing careers in the profession.
TechnologyOne has received a claim for damages in excess of $50 million from Brisbane City Council (BCC).
CSIRO’s Data61 and the Australian Institute of Company Directors (AICD) will soon create a security education and training program to lift the digital and cyber literacy of company boards.
Australian innovation is stuck in a rut. Why did this happen and how can we pick up the pace?
Two thirds of CIOs believe their risk management strategies are failing to keep up with new threats created by the shift to digital, a Gartner survey has found.
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
One of the biggest obstacles to improving information security within an organisation is the business executives, with the CIO being a big part of the problem, PwC's Global State of Information Security 2014 report has revealed.
Software design firm Thoughtworks is urging companies to avoid storing large amounts of unnecessary personal data, following recent data breaches at Target and Neiman Marcus in the United States.
More than one-third of financial services firms recently surveyed by Deloitte say they are concerned about the data quality and management capabilities of their risk management systems.
An analytics company is trying a novel approach to evaluating risk: by putting a price on it.
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues.
Dr. John Halamka, CIO at the hospital where Boston Marathon bombing patients and suspects have been treated over the past week, has shared in a blog post Tuesday lessons learned from an IT and security management perspective.
With concerns over the economy in China and the United States abating, as well as strong balance sheets and cash flows, CFOs are more confident to take on more risk and help deliver growth in their organisations, according to Deloitte’s latest Quarterly CFO Survey.