A Reflection on Notifiable Data Breach: Year One
How much trust should the Australian people put into businesses when it comes to storing their data?
Serkan Cetin, One Identity | 20 Feb | Read more
How much trust should the Australian people put into businesses when it comes to storing their data?
Serkan Cetin, One Identity | 20 Feb | Read more
As more and more devices rely on data sharing, the Internet of Things (IoT) is rapidly expanding. Developing strong privacy and security protocols for these systems is critical, as devices, applications, and communication networks become increasingly integrated.
Daniel Browning | 03 Aug | Read more
Data breaches have come to be expected. With Australia’s new mandatory data breach notification laws now in place, the Office of the Australian Information Commissioner (OAIC) was informed of 63 breaches occurring within the first six weeks of operation.
Mark McClain | 25 May | Read more
Like deer caught in the headlights, many Australian organisations are likely to be somewhat startled or confused by the new mandatory data breach laws coming into effect in just a few weeks
Barry Brailey | 05 Feb | Read more
Companies of all industries and sizes are in the midst of a revolution, driven by connected customers who expect personalised and consistent experiences across every channel.
Corinne Sklar | 20 Dec | Read more
Much of the world has gone mobile with smartphones and tablets. To a certain extent, the mobile devices have outrun the software to support them.
Peter McBryde | 19 Dec | Read more
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara | 11 Oct | Read more
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings | 10 Oct | Read more
A company’s executives inevitably undertake a number of important leadership activities, making them both visible and accessible.
Darran Rolls | 20 Sep | Read more
It’s that time of the year again. Some of us have returned to work from the school holidays while others are enjoying summer in the northern hemisphere
Radha Krishnan | 20 Jul | Read more
Security leaders need to celebrate success with a better definition of winning
Michael Santarcangelo | 10 Jul | Read more
For many SMEs, cyber insurance falls into the category of “it will never apply to me, so I probably don’t need it.”
Richard Laycock | 02 Jun | Read more
Virtual private networks are a ubiquitous tool in the business world, yet most organisations have no clear idea of their associated costs
Sean Kopelke | 22 May | Read more
Every year seems to be ‘the year of something’ in cyber security.
Kane Lightowler | 01 Mar | Read more
The security threat landscape has changed dramatically in ways unfathomable from just a few years ago. In today’s digital world where applications range in the millions, organizations need to be aware of the fact that enterprise infrastructure is not the only vulnerable spot for hackers.
Martyn Young | 27 Apr | Read more
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
The 2014 Asia-Pacific Spatial Excellence Awards (APSEA) have recognised some of the most innovative new products and technologies in the market, with augmented reality application Augview taking out the Innovation and Commercialisation Award.
DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner | 20 Feb | Read more
There’s been a lot of coverage recently around Sony Pictures and the hack attack which has placed Sony in the headlines for all the wrong reasons, with high volumes of sensitive company data stolen and posted online.
David Baker | 22 Dec | Read more