Data Protection — Opinions

Reminiscing about identity and access management (IAM)

Graham Williamson is Senior Analyst at KuppingerCole and covers the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy. He has consulted in the Identity Management sector for 15 years and is the author of the book “Identity Management: A Primer”. Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University. He has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.

Graham Williamson | 30 Mar | Read more

Securing digital identities into the future

Gartner* believes that by 2020, 60% of organisations will use active social identity proofing and let consumers bring in social identities to access risk-appropriate applications. It also predicts that by 2020 new biometric methods will displace passwords and fingerprints for access to endpoint devices across 80% of the market.

Sumal Karunanayake | 31 Aug | Read more

Dyre Straights: How to Best Combat the Latest Generation of Malware

The information security professional’s worst nightmare is the cybercriminal attack imposter armed with a legitimate user’s valid credentials. Unfortunately, the cybercriminals are adept at stealing them. Valid usernames and passwords can be lost in data breaches, keystroke loggers may capture them and ship them off, an end user can be socially engineered to reveal them – the list is long. These examples, however, are only bad dreams compared the latest generation of malware variants called Dyre or Dyreza – a Remote Access Trojan, or RAT.

Oren Kedem and Michael Toth | 09 Jul | Read more

Why cybersecurity matters

Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.

David Kim | 06 Jul | Read more

The true cost of a data breach

There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations. Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?

Robert Parker | 07 Jul | Read more

A move towards cyber resilience in a world without borders

Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.

John Ellis | 15 Jun | Read more

A World without Identity and Access Governance

Imagine if the ability to assign and manage an employee’s application and data access disappeared overnight and all of your systems and data were left wide open to everyone in your organization. Needless to say, the fallout would be disastrous. Employees would be able to see each other’s salaries, confidential trade secrets would be readily viewable and open to the world and the threat of industrial espionage after an employee’s departure would increase exponentially.

Dean Wiech | 15 Jun | Read more

The DARK Web

Recently I started to use alternative search tools such as Duck, Duck Go and my old old favorite Yahoo. Why? Well I just was wary about all the information that is being collected by Google, and just wanted to see what it was like to revert to another tool.

David Gee | 01 Jun | Read more

Three considerations to ensure your network is ready for the Internet of Things

The first thought that comes to mind for most consumers when they hear the mention of the Internet of Things (IoT) is their fridge telling them when the eggs have run out; shoes indicating how far they have travelled; cars keeping them up to date on local traffic so that they know which routes to avoid; or energy meter signaling how much heating has been consumed. While not all of these capabilities have become a reality across most households, Gartner predicts the use of connected devices to grow exponentially, with at least 4.9 billion connected things expected to be in use this year, which is up 30 percent from 2014. By 2020, Gartner forecasts this number to reach 25 billion .

Matt Miller | 20 May | Read more

5 reasons why using a VDC (Virtual Data Centre) can improve your organisations Physical and Logical Security

A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure.   With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways

Gerardo Altman | 19 May | Read more