Cauterise or Collect: the post-breach dilemma
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint | 08 Apr | Read more
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint | 08 Apr | Read more
The new hybrid threat that has surfaced in the cyber world has helped cybercriminals in their pursuit of malicious attacks.
Rodney Joffe, Neustar | 07 Feb | Read more
Cybersecurity will continue to be a key business focus for organisations in 2019 and beyond, with ongoing risks showing no signs of abating.
With 2018 coming to a close, the new year is on the horizon, and with it, new opportunities for enterprises to improve their security posture as bad actors elevate their tactics.
Lawrence Crowther, Head of Platform Architecture for APJ at Pivotal Software | 19 Dec | Read more
Does your company have effective phishing protection in place or are too many hackers slipping through the net?
Mark Sinclair | 10 Aug | Read more
The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure.
Lauren Horaist | 08 May | Read more
On 9th of January, SAP released its first set of security fixes (SAP Security Notes) for the year 2017.
Alexander Polyakov | 23 Jan | Read more
Yesterday, the federal court handed down its decision on a thorny and controversial legal dispute between Telstra, the federal privacy commissioner and former technology journalist Ben Grubb over... I was about to write “his” metadata, but I can’t. The court has deemed that it’s not his or even about him.
Andrew Colley | 20 Jan | Read more
Two of the most fundamental and perhaps difficult questions to answer in relation to information protection are:1.How do I know what to protect? 2.How do I go about protecting it?
Ashwin Pal | 19 Jan | Read more
A lot has been said recently about IT security governance and IT security governance frameworks.
Ashwin Pal | 19 Jan | Read more
The importance of context should never—ever—be underestimated. Put up a sign across a path saying “Keep Out” and you can guarantee it will be ignored, and by a sizeable majority.
Maurizio Canton | 02 Sep | Read more
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja | 26 Mar | Read more
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner | 20 Feb | Read more
Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.
Anthony Stitt | 18 Feb | Read more
As organizations try to rein in technology budgets, IT staff members are constantly tasked with doing more and providing better services, all the while keeping costs and staff to a minimum. Couple this with increased usage of applications in the cloud, and the security issues entailed therein and you have a perfect combination for delays and disgruntled users.
Dean Wiech | 16 Feb | Read more
Every business holds at least some sensitive data. This may be sensitive personal information belonging to clients or employees, or confidential data relating to business operations. Keeping this secret information secret should be a concern to every business, no matter what industry or size.
James Billingsley | 30 Jan | Read more
For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
Steve Durbin | 13 Jan | Read more
Mobile technology has redefined the way businesses operate, unleashing unprecedented levels of flexibility, collaboration and communication.
David Balazsy | 13 Jan | Read more
Cybersecurity chiefs aren’t the only ones worrying about hackers these days. Anyone who uses a credit card or stores family photos in the cloud has nagging concerns about data security. Small business owners are worried, too.
Paul Lipman | 12 Jan | Read more
The cyber-attack on Sony Pictures Entertainment in late November is not the first time that the Sony Corporation has been a target for cyber-criminals and if anything can be learned from the attacks, it is that corporations are not taking cyber-security seriously.
Mark Gregory, RMIT | 12 Jan | Read more