The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data.
David Shephard |
04 Jul |
Read more
The traditional focus of IT security has been on keeping out external threats, but the volume and frequency of security breaches caused by disgruntled, careless or negligent insiders has risen significantly in recent times.
David Shephard |
01 Jul |
Read more
Motivated by the promise of reduced operational costs, improved efficiency and better scalability, many organisations are shifting more of their IT infrastructure to cloud platforms.
Phil Kernick, CQR Consulting |
28 Jun |
Read more
Is it time for chief information security officers to step away from the front line and take strategic stock of their organisation’s security posture?
Mike Campfield |
28 Jun |
Read more
As consumers, we’re becoming more aware of the trail of data we leave behind as we go about out our daily lives. From social media sites to online shopping services, records of interactions are constantly being generated.
Peter O'Connor, Snowflake |
26 Jun |
Read more
WARNING! Spoilers for Endgame ahead.
Thomas LaRock |
24 Jun |
Read more
Remember the ransomware worm WannaCry back in 2017? After the carnage and financial damage it caused two years ago, the threat might be back again.
James Ley, Ivanti |
21 Jun |
Read more
Security is hard. There’s a lot of noise and pressure for businesses to get it right.
Tod Beardsley, Rapid7 |
21 Jun |
Read more
Every cybersecurity professional knows there’s no such thing as perfect security.
Mark Lukie, Barracuda Networks |
19 Jun |
Read more
The impact of a significant data breach can be exacerbated if your organisation isn’t ready to respond immediately once the alarm is raised.
Albert Kuo |
17 Jun |
Read more
It’s arguable that, in 2019, two types of enterprises exist: those that have implemented an enterprise-wide cloud transformation and those that will be implementing one very soon.
Budd Ilic |
17 Jun |
Read more
Phishing, exploits, malware, ransomware – it seems that every time we turn around there's another threat, technique, APT, or “super-bug” that we need to gear up and fight yet again.
Yoram Salinger |
17 Jun |
Read more
Identity information remains the holy grail of cybercriminals.
Eve Maler |
17 Jun |
Read more
Cyber security is one of the fastest growing industries around the world. As more and more companies move their businesses online, the potential for hackers to access sensitive data and use it for their own gains grows.
Damon Culbert |
13 Jun |
Read more
Australian organisations understand that, in order to remain competitive, they must accelerate digital efforts by improving their business agility.
Yannick Townsend |
08 Jun |
Read more
Cybersecurity is a highly-skilled field that heavily relies on human insight and can be extremely time intensive.
Yannick Townsend |
07 Jun |
Read more
How safe is your data? Is it at more or less risk when it’s in the cloud? These are the questions keeping security professionals awake at night.
Aaron Bugal |
27 May |
Read more
Does your business have a well-defined data governance regimen? If not, you may be one of the sizeable contingent of Australian enterprises which are playing Russian roulette with information security – and potentially creating a major risk for their company’s viability.
Peter O'Connor, Snowflake |
21 May |
Read more
The modern workplace has undergone a massive transformation over the last few decades. In a time of boundless connectivity, security management now extends beyond on-premises infrastructure and individual devices.
Graham Sowden, Okta |
20 May |
Read more
Ever logged onto a web site to be met with a pop-up box announcing that the connection is not secure and, consequently, your information may be at risk?
Scott Carter, Venafi |
20 May |
Read more