Globally, more and more jurisdictions are releasing mandates that will have a substantial impact on companies regarding breach notification and the protection of sensitive data.
Christopher Strand |
13 Mar |
Read more
When a trusted and established organisation like Yahoo gets breached, the rest of us need to start worrying. The company suffered two isolated breaches, that were disclosed separately from one another but totaled an impact of almost 1.5 billion users
Richard Cookes |
03 Mar |
Read more
Digital banking has been taking over the financial world, and there’s no going back. Not only are digital payment options like Paypal, Venmo, and Apple Pay becoming more popular, but the major banks all indicate that the numbers follow the trend: more consumers are signing up for their online options, and banks are closing down branches and reducing their employee count.
Lisa Froelings |
01 Mar |
Read more
Every year seems to be ‘the year of something’ in cyber security.
Kane Lightowler |
01 Mar |
Read more
Within the next year, Australian business will be subject to a mandatory data breach notification scheme following the passage of legislation through the senate earlier this month.
Michael Bosnar |
24 Feb |
Read more
As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team.
Simon Howe |
21 Feb |
Read more
As Artificial Intelligence (AI) becomes increasingly commoditised, cyber attackers will take advantage of AI in a similar way as businesses.
Jeffrey Kok |
21 Feb |
Read more
It really is one of the iconic events of the sporting calendar. Every year some of the biggest stars in American sport battle in the biggest show on earth.
Patrick Hubbard |
07 Feb |
Read more
It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive until a ransom is paid.
Corey Nachreiner |
31 Jan |
Read more
Sitting at the heart of every large organisation, the data centre has experienced fundamental change during the past decade
David De Laine |
31 Jan |
Read more
The jury has not yet been assembled to assess the fallout from the 2016 US Presidential email hacking scandal but the implications have certainly sent shock waves rippling throughout the world. Certainly the notion that anything is possible rings true.
Tim Fisher |
26 Jan |
Read more
IT professionals need greater insight and understanding of their networks. The status quo just is not enough anymore as network security threats rise and customer demand for a better quality of experience escalates.
Keith Bromley |
26 Jan |
Read more
Latest statistics show that more than 28 billion people will be connected to the Internet of Things in 2017, rising to 34 billion-plus next year.
Kane Lightowler |
25 Jan |
Read more
Have you already seen the latest Oracle’s Critical Patch Update and are you overwhelmed with the numerous fixes? This is hardly surprising.
Alexander Polyakov |
25 Jan |
Read more
It's a security problem that's existed for more than 10 years, yet ransomware is continuing to grow exponentially and cause disruption and losses for businesses around the world.
Shane Muller |
24 Jan |
Read more
What will 2017 bring for your organisation? Unfortunately, there’s a strong likelihood that it will bring a costly cyberattack.
Nathan Shuchami |
24 Jan |
Read more
On 9th of January, SAP released its first set of security fixes (SAP Security Notes) for the year 2017.
Alexander Polyakov |
23 Jan |
Read more
Two of the most fundamental and perhaps difficult questions to answer in relation to information protection are:1.How do I know what to protect? 2.How do I go about protecting it?
Ashwin Pal |
19 Jan |
Read more
A lot has been said recently about IT security governance and IT security governance frameworks.
Ashwin Pal |
19 Jan |
Read more
As an IT security professional, I have been asked the question’ How does security add value to the business?’ many times. In this article I will attempt to answer this question and explain how the concepts can be applied.
Ashwin Pal |
17 Jan |
Read more