Barely a day goes by without new reports of organisations falling victim to cyber-attacks. Data breaches, network outages and system disruptions have become an unfortunate reality of the modern digital world.
David De Laine |
31 Mar |
Read more
In 2014, Australian police foiled an attempt by Russian cyber criminals to steal AUD 570 million from several Australian organisations. Other companies such as Telstra were less lucky. Cyber crime costs Australia as much as AUD 2 billion annually, according to the Australian Attorney-General's Department. And, the number of attacks is rising by 20 percent each year.
Ram Vaidyanathan |
31 Mar |
Read more
After several years in the wild, network virtualisation has turned a corner and is likely to see more widespread adoption over the next five years. In fact, until now networks have remained pretty bland. But this is changing fast.
Leon Adato |
30 Mar |
Read more
We all have many cyber security tools and the sad truth is that breaches and vulnerabilities still take a long time to be detected and re-mediated. The quoted data is that it takes around 252 days to detect then a further 82+ days to resolve.
David Gee |
30 Mar |
Read more
Graham Williamson is Senior Analyst at KuppingerCole and covers the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy. He has consulted in the Identity Management sector for 15 years and is the author of the book “Identity Management: A Primer”. Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University. He has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.
Graham Williamson |
30 Mar |
Read more
Gartner* believes that by 2020, 60% of organisations will use active social identity proofing and let consumers bring in social identities to access risk-appropriate applications. It also predicts that by 2020 new biometric methods will displace passwords and fingerprints for access to endpoint devices across 80% of the market.
Sumal Karunanayake |
31 Aug |
Read more
Long gone are the days when a cyber-intrusion evoked images of pimple-faced teenagers hacking away in their parents’ basements. These days, cybercrime is global and gravely sinister.
Steve Durbin |
10 Jul |
Read more
The information security professional’s worst nightmare is the cybercriminal attack imposter armed with a legitimate user’s valid credentials. Unfortunately, the cybercriminals are adept at stealing them. Valid usernames and passwords can be lost in data breaches, keystroke loggers may capture them and ship them off, an end user can be socially engineered to reveal them – the list is long. These examples, however, are only bad dreams compared the latest generation of malware variants called Dyre or Dyreza – a Remote Access Trojan, or RAT.
Oren Kedem and Michael Toth |
09 Jul |
Read more
Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.
David Kim |
06 Jul |
Read more
There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations.
Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?
Robert Parker |
07 Jul |
Read more
Data breaches have hit the news recently for all the wrong reasons. A major grocery chain has recently suffered a major data leak, the latest in a long line of businesses that have been forced into damage control mode after widespread dissemination of information that should never have entered the public domain.
Kieran O'Shaughnessy |
18 Jun |
Read more
Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.
John Ellis |
15 Jun |
Read more
Imagine if the ability to assign and manage an employee’s application and data access disappeared overnight and all of your systems and data were left wide open to everyone in your organization. Needless to say, the fallout would be disastrous. Employees would be able to see each other’s salaries, confidential trade secrets would be readily viewable and open to the world and the threat of industrial espionage after an employee’s departure would increase exponentially.
Dean Wiech |
15 Jun |
Read more
In a recent AustCert conference it was expressed to the CSO Editor that many struggled with "How to actually affect change in IT security behavior”. And not just "raise" awareness.
David Gee |
05 Jun |
Read more
In this ever changing and quickly evolving political landscape that the world operates under, should we be increasingly concerned of cyber-attacks and fraud as more nations remove themselves further and further from communism?
Thomas Booth |
01 Jun |
Read more
Recently I started to use alternative search tools such as Duck, Duck Go and my old old favorite Yahoo. Why? Well I just was wary about all the information that is being collected by Google, and just wanted to see what it was like to revert to another tool.
David Gee |
01 Jun |
Read more
The first thought that comes to mind for most consumers when they hear the mention of the Internet of Things (IoT) is their fridge telling them when the eggs have run out; shoes indicating how far they have travelled; cars keeping them up to date on local traffic so that they know which routes to avoid; or energy meter signaling how much heating has been consumed. While not all of these capabilities have become a reality across most households, Gartner predicts the use of connected devices to grow exponentially, with at least 4.9 billion connected things expected to be in use this year, which is up 30 percent from 2014. By 2020, Gartner forecasts this number to reach 25 billion .
Matt Miller |
20 May |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more
A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure. With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways
Gerardo Altman |
19 May |
Read more
Along with an Opex-leaning cost model, cloud computing’s appeal has included dynamic capacity provisioning where compute and storage resources can be added, moved and removed almost instantaneously.
Ian Teague |
18 May |
Read more