Security Industry — Opinions

​Adaptive Security Architecture: Enhancing Your Security

Today, an array of ‘Security Innovation’ is happening. There has never been a time where there is more security innovation, and more security spend, as companies and corporations face greater chances of being cyber attacked. There is a new world we must secure - devices, apps (traditional and cloud native) and the cloud (managed, private and public).

Nathan Lowe | 18 May | Read more

5 reasons why using a VDC (Virtual Data Centre) can improve your organisations Physical and Logical Security

A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure.   With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways

Gerardo Altman | 19 May | Read more

Five Ways to Reduce the Cost and Complexity of Cyber Security

If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.

Paul Lipman | 28 Apr | Read more

Proactive web security with client reputational services

In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.

Sudeep Charles | 27 Apr | Read more

Active Online Security Measures for Business

Australian businesses are under constant threat from criminals that utilise the inherent features of infrastructure and systems connected to digital networks—and the rate of cyber-attacks is increasing, according to a recent report from the Australian Signals Directorate (ASD).

Mark Gregory, RMIT | 27 Apr | Read more

Tackling the human element of cyber security

The number and complexity of cyber-attacks has been increasing steadily over the last decade. Many adversaries are targeting the communications and information systems of organisations to extract large amounts of sensitive data, often hijacking insider credentials as a preferred method of breach. Identity has become today’s biggest security gap.

Dean Nicholls | 31 Mar | Read more

10.5 Tips to Protect Your Magento Store from Smart Hacker

E-commerce and financial websites stand first in the list of possible victims of cyber crime, as these websites deal with the monetary transactions. Being one of the most popular ecommerce platforms, Magento is also under threat of hacking attacks and unauthorized logins. Magento comes with various built-in security features, still there is always more that can be done in order to protect your online store from the smart hackers. With rich expertise in enhancing Magento security, I want to share with you some tips that will help you to protect your online store and keep hackers at bay.

Linda Phillips | 31 Mar | Read more

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

The Active International Response to Cyber Crime

The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.

Mark Gregory | 26 Mar | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

Return on Prevention: The Business Value of DDoS Protection

DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.

Nick Race | 09 Mar | Read more

Interpreting Data

The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.

Emmanuel Carabott | 09 Mar | Read more

How SSL encryption gives a false sense of security

Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.

Ananda Rajagopal | 03 Mar | Read more