Cybersecurity and ICT security talent is a highly sought-after commodity in today’s market, in Australia this seems to be driving up the cost for companies to actually obtain security talent.
Craig Ford |
25 Oct |
Read more
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara |
11 Oct |
Read more
Even the most sophisticated information security programs can prove vulnerable to online and digital threats if employees aren’t engaged.
CSO staff |
07 Sep |
Read more
Amazon Web Services (AWS), once used as a ‘testing playground’ for proof of concept has evolved in the last five years to a complex arena of possibilities. The conversation has changed from ‘how can I put my website on Amazon in a secure way?’ to ‘how can I move multiple things to the cloud but still make sure it’s secure?’.
Ashish Rajan |
10 Jul |
Read more
Most high-profile attacks on corporate data centres and institutional networks have originated outside of the victimised organisations – in many cases from halfway around the world.
Steve Durbin |
06 Jul |
Read more
The ability to integrate data from disparate sources in order to analyse and make sense of it is not only key to doing business today; it’s the difference between a company’s success and failure.
Tim Macdermid |
30 May |
Read more
Today, an array of ‘Security Innovation’ is happening. There has never been a time where there is more security innovation, and more security spend, as companies and corporations face greater chances of being cyber attacked. There is a new world we must secure - devices, apps (traditional and cloud native) and the cloud (managed, private and public).
Nathan Lowe |
18 May |
Read more
“Know your enemy and know yourself and you can fight a hundred battles without disaster”—Sun Tzu
Security professionals love to quote Sun Tzu. It can help to change the way security is approached.
Kane Lightowler |
20 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
The idea of punishing someone for getting Malware is abhorrent to myself. But if you are a CISO, then you have mobilise your team and address the issue.
David Gee |
31 Mar |
Read more
Lately I have seen a number of new CISOs let go after one year on the job. I became intrigued as to why we are seeing such a high failure rate for new CISOs.
Todd Bell |
10 Nov |
Read more
Most organisations have embraced mobility as strategy to fully enable their mobile workforces. In essence, this has meant that we have striven to provide for the remote worker access to all the tools that we have in the Headquarters.
David Gee |
06 Aug |
Read more
Walls of greenery, circadian lighting and workspaces specially designed to accommodate activity-based working are just some of the features of Medibank’s new Docklands headquarters in Melbourne.
Chris Woodroffe |
03 Jul |
Read more
“This week, it was announced the federal government is putting through a new bill which obliges about 1600 Telco’s and related companies to protect their networks from unauthorised access and interference. Breach notification laws have been highly effective at forcing organisations to review IT Security in countries such as the USA and Europe.
Phillip Simpson |
01 Jul |
Read more
In a recent AustCert conference it was expressed to the CSO Editor that many struggled with "How to actually affect change in IT security behavior”. And not just "raise" awareness.
David Gee |
05 Jun |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more
A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure. With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways
Gerardo Altman |
19 May |
Read more
If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.
Paul Lipman |
28 Apr |
Read more
Data breaches have very quickly climbed the information security agenda and that includes the data breach threat posed by employees and IT professionals.
Doug Barney |
27 Apr |
Read more
In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.
Sudeep Charles |
27 Apr |
Read more