PhishLine®, Partners with Enex Carbon to Provide Holistic Security Culture and Awareness
Even the most sophisticated information security programs can prove vulnerable to online and digital threats if employees aren’t engaged.
Even the most sophisticated information security programs can prove vulnerable to online and digital threats if employees aren’t engaged.
The ability to integrate data from disparate sources in order to analyse and make sense of it is not only key to doing business today; it’s the difference between a company’s success and failure.
Tim Macdermid | 30 May | Read more
Today, an array of ‘Security Innovation’ is happening. There has never been a time where there is more security innovation, and more security spend, as companies and corporations face greater chances of being cyber attacked. There is a new world we must secure - devices, apps (traditional and cloud native) and the cloud (managed, private and public).
Nathan Lowe | 18 May | Read more
The idea of punishing someone for getting Malware is abhorrent to myself. But if you are a CISO, then you have mobilise your team and address the issue.
A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure. With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways
Gerardo Altman | 19 May | Read more
If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.
Paul Lipman | 28 Apr | Read more
Data breaches have very quickly climbed the information security agenda and that includes the data breach threat posed by employees and IT professionals.
Doug Barney | 27 Apr | Read more
In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.
Sudeep Charles | 27 Apr | Read more
Australian businesses are under constant threat from criminals that utilise the inherent features of infrastructure and systems connected to digital networks—and the rate of cyber-attacks is increasing, according to a recent report from the Australian Signals Directorate (ASD).
Mark Gregory, RMIT | 27 Apr | Read more
The number and complexity of cyber-attacks has been increasing steadily over the last decade. Many adversaries are targeting the communications and information systems of organisations to extract large amounts of sensitive data, often hijacking insider credentials as a preferred method of breach. Identity has become today’s biggest security gap.
Dean Nicholls | 31 Mar | Read more
E-commerce and financial websites stand first in the list of possible victims of cyber crime, as these websites deal with the monetary transactions. Being one of the most popular ecommerce platforms, Magento is also under threat of hacking attacks and unauthorized logins. Magento comes with various built-in security features, still there is always more that can be done in order to protect your online store from the smart hackers. With rich expertise in enhancing Magento security, I want to share with you some tips that will help you to protect your online store and keep hackers at bay.
Linda Phillips | 31 Mar | Read more
Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.
Steve Durbin | 30 Mar | Read more
The continuous coverage of network breaches and data leaks, indicates that information security has become a dangerous blind spot for many businesses. This is making it critical for CEO’s to familiarise themselves with their organisation’s internet security policies and procedures, as they become increasingly accountable for any failures.
David Higgins | 27 Mar | Read more
The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.
Mark Gregory | 26 Mar | Read more
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja | 26 Mar | Read more
In an environment of unrelenting attacks, network packet capture and security analytics are essential for discovering the attack while it is in progress and to provide the intelligence to minimise the damage done as well as to prevent future attacks.
Scott Crane | 24 Mar | Read more
With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.
DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.
The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.
Emmanuel Carabott | 09 Mar | Read more
Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.
Ananda Rajagopal | 03 Mar | Read more