Data Protection — Opinions

Establishing a Cloud Broker Model – Part 2

In 1973 Peter Drucker in his book “Management Tasks and Responsibilities” defined strategic planning as: <i>“The continuous process of making present entrepreneurial (risk-taking) decisions systematically and with the greatest knowledge of their futurity..."

Puneet Kukreja | 04 Jun | Read more

Stuxnet, Ethics and the Law

This first of 3 part series discusses the development of the Stuxnet malware, the legal and ethical issues. This thought provoking article raises questions into cyber terrorism and weather this is for offensive or defensive purposes.

Nick Morgan | 10 May | Read more

Login to the real world with your Facebook account

It seems like every other website we visit today presents us with a “login with a social network” button. We are sometimes presented with a choice, usually between Facebook, Twitter or LinkedIn. But the most common social network encountered is Facebook and the most common scenario where we are offered this option is when we attempt to use a technology-focused service online. This is starting to change and we will start to notice it in a matter of months.

Ian Yip | 09 May | Read more

Cyber Security and the CIO Challenge

Cyber security is the double edged sword of modern business. Because the Internet is an evolving technology that carries enormous potential and vulnerability, cyber security embraces questions of internet freedom, network architecture and the economic potential of cyberspace

Gordon Makryllos | 09 Apr | Read more

Establishing a Cloud Broker Model – Part 1

Information Security, IT Security, Technology Security, IT Risk and Security and IT Risk Services are all names that organisations use to define a functional unit within their enterprise that is responsible for the security, integrity and operational assurance of their information assets and operating environment.

Puneet Kukreja | 15 Mar | Read more

The threat landscape: the next trends in cyber security

Cyber security remains one of the most dynamic fields within the technology industry. Because of the financial and political impact of cybercrime, attackers are continuously looking to innovate and outsmart security vendors and consulting companies. As a result, the IT community is perpetually engaged in a contest of strategy to combat new cyber threats. These are some of the top security threats we can expect to see developing over the next year, including top tips to combat these dangers.

Gordon Makryllos | 05 Dec | Read more

Putting the 'A' in availability

After the debacle that has been Click Frenzy, I'm going to focus on availability. Click Frenzy was a coordinated advertising promotion with a large number of Australian online shopping websites. This sounded like a great idea, and many retailers paid good money to be part of it. The problem was that the click frenzy website struggled under the load and so did a few of the online retailers, resulting in a vicious backlash on social media.

Matt Hackling | 28 Nov | Read more

High Profile Cyber-Security Breaches in Australia

Mainstream Australian media sites now regularly mention hacking incidents carried out by the hacktivist group 'Anonymous'. The group recently defaced several prominent Australian websites, and has now also claimed to have stolen user credentials and contact information from Pizza Hut Australia.

V Bala | 28 Nov | Read more

Is anything private in Web 2.0?

The answer to this question is simple: no. With the developments in social media and two-way communication channels such as Twitter, Facebook and YouTube, it has made social privacy somewhat non-existent.

Olan Ahern | 23 Nov | Read more

Exposing insider threats

Insider threats — for example, data theft, intellectual property loss, privacy breaches and financial fraud — can be the most challenging IT risks for an organisation to address because they may or may not be happening. But if an insider threat occurs, it could no doubt hurt financially and/or publically. So how do you implement early detection to discover and expose these threats?

Stuart Meyers | 13 Nov | Read more

Redefining BYOD

More companies are seeing the benefits of allowing their employees to bring personally owned devices into the workplace and onto the corporate network. The familiarity of having your own smartphone for work means that you can work faster and, perhaps cynically from the employer’s perspective, that you are far more likely to work longer.

Rik Ferguson | 13 Nov | Read more

The Industrialisation of Hacking

The Industrial Revolution transformed four key aspects of society—innovation, transportation, communication and financial markets—changing the world forever. Although it began more than 200 years ago, there are surprising some parallels between this historically transformative period and IT security. The dynamics of the threat landscape and the increasing complexity of IT environments have given rise to a new era: The ‘Industrialisation of Hacking’.

Chris Wood | 26 Oct | Read more

The magic of mobility vs the safety of security

Mobility has become a key part of business operations in recent years. Smartphones and tablets have become an accepted part of everyday business as the workforce becomes more and more dispersed, with managers expecting their employees to remain connected and productive while they are away from the office.

Gordon Makryllos | 12 Sep | Read more

Think cloud – think strategy – think "Sun Tzu"

The steady rise of cloud over the last few years across the software, infrastructure and platform domains has forced most technology business leaders to stop and take note. The voracity with which the perceived value and adoption of cloud computing and cloud Services has grown should be viewed and actioned as a strategic initiative and not a tactical undertaking with short term goals and limited benefits. To move things along and provide context I turn to Sun Tzu's "The Art of War", that helps identify strategy elements required by executives and senior management grappling with the challenge of cloud.

Puneet Kukreja | 31 Aug | Read more

Why its time to upgrade to a next generation firewall

Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:

CSO staff | 31 Aug | Read more