The Human Factor of Cyber Security
The recent successful cyber-attacks against Victorian regional hospitals highlights a growing concern in cyber security and technology circles.
Shannon Sedgwick | 08 Oct | Read more
The recent successful cyber-attacks against Victorian regional hospitals highlights a growing concern in cyber security and technology circles.
Shannon Sedgwick | 08 Oct | Read more
The recent data breaches at Capital One and National Australia Bank (NAB) reinforce the evidence that human error represents a serious threat to organisations in finance.
David Shephard | 24 Sep | Read more
Australian organisations understand that, in order to remain competitive, they must accelerate digital efforts by improving their business agility.
Yannick Townsend | 08 Jun | Read more
If you’re living off the land, there are a few different methods you can use to survive, but you need to use what you find where you are
Mark Goudie | 30 Apr | Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal | 15 Mar | Read more
Trust is a fickle concept in IT security. We trust that our applications are secure up until that trust is violated — like after a vulnerability is exposed or after an outage or breach.
George Tsoukas, Avi Networks | 15 Mar | Read more
We use tools every day to do our jobs. We lose sight of this in our hectic lives with all the noise around us, but we need to consider that tools are used by people, and some people operate tools more efficiently than others.
Carbon Black | 20 Feb | Read more
Threat hunting is a critical discipline that more organisations are using to disrupt stealthy attacks before they become mega breaches.
Scott Taschler | 04 Feb | Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks | 18 Dec | Read more
Data breaches continue to impact Australian organisations and businesses more than ever before.
CIOs will be familiar with the dilemma. There are so many cloud options out there now – how do you know which is best for your business? How can you ensure you are delivering services that are both customer-centric and business-aligned?
Nathan Steiner | 08 Oct | Read more
Recent security incidents and the introduction of new data breach legislation across Australia and Europe are driving greater awareness around the need for cybersecurity best practices.
Steve Hunter | 16 Aug | Read more
Security professionals are used to seeing a high turnover of threats, with new vulnerabilities disclosed weekly and regular rounds of patches to contend with.
Chris Berry | 16 Jul | Read more
Data breaches have come to be expected. With Australia’s new mandatory data breach notification laws now in place, the Office of the Australian Information Commissioner (OAIC) was informed of 63 breaches occurring within the first six weeks of operation.
Mark McClain | 25 May | Read more
During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Tim Murphy | 24 Apr | Read more
The new data breach legislation which came into effect in Australia recently means that every ‘sizeable’ organisation must comply or risk crippling fines of up to $2.1 million With cybercrime and ransomware attacks on the rise, it’s not a question of ‘if’ a data breach is going to happen, it’s ‘when’ and how quickly your organisation can get back up and running following the event.
Andrew Martin | 14 Mar | Read more
There is a common scenario beloved by many sci-fi films and programmes; a spaceship crew lands on some new planet that, unbeknownst to them, is crawling with shape-shifting aliens.
Craig Stewart | 26 Feb | Read more
As demands increase on speed to deliver new software, services and value are increasing for all enterprises, including government departments, banks, and critical infrastructure, the agile new development mode ‘DevOps’ is taking hold.
Elizabeth Lawler | 15 Feb | Read more
High returns, low labour and no patience; the characteristics of most attack campaigns as the options for cyber-criminals to monetise attacks becomes broader, less complex and less risky than ever.
Tim Murphy | 01 Feb | Read more
Corporate Australia seems to be oblivious to the spate of hack attacks which have cost companies and individuals many millions in stolen credit card details and identity theft.
Michael Bosnar | 01 Feb | Read more