Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?
Ashwin Pal |
02 Aug |
Read more
Research is in progress that will make it easier to find patterns of attack by cyber-criminals, and share results with the larger community.
Brett Williams |
27 Jul |
Read more
Since Mother Nature decided to flex her muscles recently, insurance has become something of a hot topic.
Scott Crane |
22 Jul |
Read more
Australian companies are seriously lagging behind their US and UK counterparts when it comes to cyber security. According to Deloitte, Australian companies could risk becoming “low-hanging fruit” for cyber criminals due to a lack of education and an unwillingness to properly deal with cyber threats.
Liam Rowland |
27 Apr |
Read more
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
Nick Race |
12 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
There is an undeniable shortage of Cyber Security resources in Australia and the short-term answer has to be to bring talent in from other countries.
David Gee |
31 Mar |
Read more
The idea of punishing someone for getting Malware is abhorrent to myself. But if you are a CISO, then you have mobilise your team and address the issue.
David Gee |
31 Mar |
Read more
Phishing attacks have been there since the time authentication methods have been in place. An attack where the attacker tricks the victim into submitting their authentication credentials is termed as phishing attacks. With advancement of technology, the attacks also have been advancing, causing significant damage to the victims at times.
Shantanu Bhattacharya |
31 Mar |
Read more
Hackers, attackers and cybercriminals are no slouches when it comes to staying on the cutting edge of the tools of their trade. The black hats that seek to exploit our networks, applications and users are inventive and excellent problem solvers when it comes to finding new ways to break into our systems.
Nicolas Lennon |
31 Mar |
Read more
Barely a day goes by without new reports of organisations falling victim to cyber-attacks. Data breaches, network outages and system disruptions have become an unfortunate reality of the modern digital world.
David De Laine |
31 Mar |
Read more
In 2014, Australian police foiled an attempt by Russian cyber criminals to steal AUD 570 million from several Australian organisations. Other companies such as Telstra were less lucky. Cyber crime costs Australia as much as AUD 2 billion annually, according to the Australian Attorney-General's Department. And, the number of attacks is rising by 20 percent each year.
Ram Vaidyanathan |
31 Mar |
Read more
Long gone are the days when a cyber-intrusion evoked images of pimple-faced teenagers hacking away in their parents’ basements. These days, cybercrime is global and gravely sinister.
Steve Durbin |
10 Jul |
Read more
The information security professional’s worst nightmare is the cybercriminal attack imposter armed with a legitimate user’s valid credentials. Unfortunately, the cybercriminals are adept at stealing them. Valid usernames and passwords can be lost in data breaches, keystroke loggers may capture them and ship them off, an end user can be socially engineered to reveal them – the list is long. These examples, however, are only bad dreams compared the latest generation of malware variants called Dyre or Dyreza – a Remote Access Trojan, or RAT.
Oren Kedem and Michael Toth |
09 Jul |
Read more
Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.
David Kim |
06 Jul |
Read more
There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations.
Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?
Robert Parker |
07 Jul |
Read more
Data breaches have hit the news recently for all the wrong reasons. A major grocery chain has recently suffered a major data leak, the latest in a long line of businesses that have been forced into damage control mode after widespread dissemination of information that should never have entered the public domain.
Kieran O'Shaughnessy |
18 Jun |
Read more
Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.
John Ellis |
15 Jun |
Read more
In this ever changing and quickly evolving political landscape that the world operates under, should we be increasingly concerned of cyber-attacks and fraud as more nations remove themselves further and further from communism?
Thomas Booth |
01 Jun |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more