How does your organisation cope when your data has left the building — or the country? Data sovereignty can be a vital legal issue, because data becomes subject to the laws of the country it's stored in — and that changes the risk profile.
Stilgherrian |
03 Jul |
Read more
In 1973 Peter Drucker in his book “Management Tasks and Responsibilities” defined strategic planning as: <i>“The continuous process of making present entrepreneurial (risk-taking) decisions systematically and with the greatest knowledge of their futurity..."
Puneet Kukreja |
04 Jun |
Read more
This first of 3 part series discusses the development of the Stuxnet malware, the legal and ethical issues. This thought provoking article raises questions into cyber terrorism and weather this is for offensive or defensive purposes.
Nick Morgan |
10 May |
Read more
It seems like every other website we visit today presents us with a “login with a social network” button. We are sometimes presented with a choice, usually between Facebook, Twitter or LinkedIn. But the most common social network encountered is Facebook and the most common scenario where we are offered this option is when we attempt to use a technology-focused service online. This is starting to change and we will start to notice it in a matter of months.
Ian Yip |
09 May |
Read more
Cyber security is the double edged sword of modern business. Because the Internet is an evolving technology that carries enormous potential and vulnerability, cyber security embraces questions of internet freedom, network architecture and the economic potential of cyberspace
Gordon Makryllos |
09 Apr |
Read more
Information Security, IT Security, Technology Security, IT Risk and Security and IT Risk Services are all names that organisations use to define a functional unit within their enterprise that is responsible for the security, integrity and operational assurance of their information assets and operating environment.
Puneet Kukreja |
15 Mar |
Read more
There’s been bit of coverage in the technology press about Google’s “Indexing” of tens of thousands of publicly available printers connected directly to the Internet.
Darren Arnott |
06 Feb |
Read more
Over the last 2-3 years cloud computing has promised, and in many instances delivered, a lower total cost of ownership. This has helped organisations return the focus of operation to their core activities—reducing the effort spent on managing IT infrastructure and applications.
Puneet Kukreja |
19 Dec |
Read more
Cyber security remains one of the most dynamic fields within the technology industry. Because of the financial and political impact of cybercrime, attackers are continuously looking to innovate and outsmart security vendors and consulting companies. As a result, the IT community is perpetually engaged in a contest of strategy to combat new cyber threats. These are some of the top security threats we can expect to see developing over the next year, including top tips to combat these dangers.
Gordon Makryllos |
05 Dec |
Read more
After the debacle that has been Click Frenzy, I'm going to focus on availability. Click Frenzy was a coordinated advertising promotion with a large number of Australian online shopping websites. This sounded like a great idea, and many retailers paid good money to be part of it. The problem was that the click frenzy website struggled under the load and so did a few of the online retailers, resulting in a vicious backlash on social media.
Matt Hackling |
28 Nov |
Read more
Mainstream Australian media sites now regularly mention hacking incidents carried out by the hacktivist group 'Anonymous'. The group recently defaced several prominent Australian websites, and has now also claimed to have stolen user credentials and contact information from Pizza Hut Australia.
V Bala |
28 Nov |
Read more
The answer to this question is simple: no. With the developments in social media and two-way communication channels such as Twitter, Facebook and YouTube, it has made social privacy somewhat non-existent.
Olan Ahern |
23 Nov |
Read more
The malware BKDR_ADDNEW, better known as 'DaRK DDoSseR' in the underground, is a tool that provides distributed denial of service (DDOS) capability combined with password stealing functionality. The tool costs $30 and has been available for several years.
Nart Villeneuve (Senior Threat Researcher) |
13 Nov |
Read more
Insider threats — for example, data theft, intellectual property loss, privacy breaches and financial fraud — can be the most challenging IT risks for an organisation to address because they may or may not be happening. But if an insider threat occurs, it could no doubt hurt financially and/or publically. So how do you implement early detection to discover and expose these threats?
Stuart Meyers |
13 Nov |
Read more
More companies are seeing the benefits of allowing their employees to bring personally owned devices into the workplace and onto the corporate network. The familiarity of having your own smartphone for work means that you can work faster and, perhaps cynically from the employer’s perspective, that you are far more likely to work longer.
Rik Ferguson |
13 Nov |
Read more
The Industrial Revolution transformed four key aspects of society—innovation, transportation, communication and financial markets—changing the world forever. Although it began more than 200 years ago, there are surprising some parallels between this historically transformative period and IT security. The dynamics of the threat landscape and the increasing complexity of IT environments have given rise to a new era: The ‘Industrialisation of Hacking’.
Chris Wood |
26 Oct |
Read more
Six tips to help get the efficient and secure management of mobile devices under control.
Gordon Makryllos |
10 Oct |
Read more
Mobility has become a key part of business operations in recent years. Smartphones and tablets have become an accepted part of everyday business as the workforce becomes more and more dispersed, with managers expecting their employees to remain connected and productive while they are away from the office.
Gordon Makryllos |
12 Sep |
Read more
The steady rise of cloud over the last few years across the software, infrastructure and platform domains has forced most technology business leaders to stop and take note. The voracity with which the perceived value and adoption of cloud computing and cloud Services has grown should be viewed and actioned as a strategic initiative and not a tactical undertaking with short term goals and limited benefits. To move things along and provide context I turn to Sun Tzu's "The Art of War", that helps identify strategy elements required by executives and senior management grappling with the challenge of cloud.
Puneet Kukreja |
31 Aug |
Read more
Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices.
Is your firewall capable of handling the growing demands of your business?
Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls.
Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:
CSO staff |
31 Aug |
Read more