Red teaming is a well-known tool for improving your resilience to a cyber-attack. The idea is you have a team of people, either internal experts or internal people learning the craft with the support of external partners such as penetration testers, who play the part of hackers trying to infiltrate your organisation and execute a cyber-attack.
Anthony Caruana |
09 Jun |
Read more
On 22 February 2018, new laws mandating businesses to report the leak of personal identifiable information (PII) to the Office of the Australian Information Commissioner (OAIC) come into effect. During this year’s AusCERT conference Ben Di Marco and Matthew Pokarier walked through this new law and what it means for businesses.
Anthony Caruana |
08 Jun |
Read more
While AI and machine learning are buzzwords, Symantec's Nick Savvides said, during this year's AusCERT conference they have been a big deal in computing circles since the 1950s. But it was in the 1980s when AI came into mainstream thinking a culture. It was movies like War Games and The Terminator, and TV shows like Knight Rider that took this important technology and moved it into mainstream consciousness.
Anthony Caruana |
05 Jun |
Read more
With so many security projects and initiatives taking place across Australia and New Zealand, being chosen as the best security initiative of the last year is a great recognition of strong work over the last year. Kasada (https://www.kasada.io) was rewarded for their work on thwarting bot attacks at the 2017 AusCERT conference.
Anthony Caruana |
05 Jun |
Read more
The story of how Samy Kamkar made his reputation in information security is the stuff of legend. After getting his first computer as a ten year old, he started exploring the Internet through message boards, IRC, gaming and creating hacks and cheats for the games, before moving on to other forms of online activity.
Anthony Caruana |
01 Jun |
Read more
We have all say through the standard company training on cyber-security. It usually starts with an hour or two trapped in a packed seminar room, surrounded by colleagues pretending to take notes but really playing Words With Friends on their smartphones, followed by bad coffee and slightly stale pastries.
Anthony Caruana |
31 May |
Read more
Christina Camilleri is a security analyst at Bishop Fox, a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech start-ups. Although she works on the “right” side of the security business, she is not only interested but also highly skilled in penetration testing and red teaming – assuming the role of a hacker in security exercises.
Anthony Caruana |
31 May |
Read more
Todd Peterson, from One Identity, delivered the second part of the AusCERT 2017 opening keynote. One Identity may sound like a new business but it’s an offshoot from Dell EMC and Quest Software.
Anthony Caruana |
30 May |
Read more
That was the premise of Darren Kitchen and Shannon Morse’s opening keynote at this year’s AusCERT conference. Attended by over 700 delegates from nine countries, they held the audience in their thrall as they discussed how the intersection of convenience and trust has enabled threat actors to break into systems and access data.
Anthony Caruana |
30 May |
Read more
One of the last places you’d expect to find a corporate lawyer is a cybersecurity conference. But as the regulatory and legal landscape for businesses change the intersection between policy and technology is widening.
Anthony Caruana |
29 May |
Read more
The cloud has completely changed the nature of network and application architecture. The changes have been profound.
Anthony Caruana |
30 Mar |
Read more
At this year's CSO Perspectives Roadshow Leon Fouche, BDO's national leader for cyber security walked the audience through a number of different security reports to paint a picture of the threats today's world is facing.
Anthony Caruana |
22 Mar |
Read more
IoT is a significant threat surface. Even devices such as modern smartphones, which are perhaps the first IoT device that hit many of our networks, carry out many actions that are largely invisible to many of us. Other devices were developed with few security controls, where "if it works - ship" rules, into environments where that were never anticipated.
Anthony Caruana |
17 Mar |
Read more
There was a time when a crisis was a once-in-a-company-lifetime event that only happened to the unlucky. But today’s world is faster moving and more volatile than ever before.
Anthony Caruana |
16 Mar |
Read more
Mark Loveless is a security researcher with Duo, a company focussed on two-factor authentication. He spoke at the CSO Perspectives Roadshow on his journey in the infosec business, where he has worked as both a white-hat and a black-hat hacker.
Anthony Caruana |
14 Mar |
Read more