Within the next year, Australian business will be subject to a mandatory data breach notification scheme following the passage of legislation through the senate earlier this month.
Michael Bosnar |
24 Feb |
Read more
One of the biggest challenges facing Australian businesses and government departments today is finding ways to secure their core IT infrastructures from targeted and potentially costly attacks.
Matthew Brazier |
03 Feb |
Read more
Cyber crime has been on the rise in Australia and New Zealand, and is likely to continue. Between July 2015 and June 2016, Australia’s Computer Emergency Response Team (CERT Australia) responded to 14,804 cyber security incidents affecting Australian businesses.
Joshua Kennedy-White |
01 Feb |
Read more
The jury has not yet been assembled to assess the fallout from the 2016 US Presidential email hacking scandal but the implications have certainly sent shock waves rippling throughout the world. Certainly the notion that anything is possible rings true.
Tim Fisher |
26 Jan |
Read more
IT professionals need greater insight and understanding of their networks. The status quo just is not enough anymore as network security threats rise and customer demand for a better quality of experience escalates.
Keith Bromley |
26 Jan |
Read more
Latest statistics show that more than 28 billion people will be connected to the Internet of Things in 2017, rising to 34 billion-plus next year.
Kane Lightowler |
25 Jan |
Read more
It's a security problem that's existed for more than 10 years, yet ransomware is continuing to grow exponentially and cause disruption and losses for businesses around the world.
Shane Muller |
24 Jan |
Read more
What will 2017 bring for your organisation? Unfortunately, there’s a strong likelihood that it will bring a costly cyberattack.
Nathan Shuchami |
24 Jan |
Read more
With Wi-Fi networks now a ubiquitous feature in the modern world, they have become an attractive target for cyber criminals.
David Higgins |
16 Dec |
Read more
It’s no secret that the threat of cyber-crime in Australia is on the rise. Last year, the number of cyber-threats more than doubled.
Dan Slattery |
08 Dec |
Read more
The integrity of information will be one of the biggest challenges global consumers, businesses and governments face in 2017, where information from previously venerated sources is no longer trusted.
John Worrall |
06 Dec |
Read more
The recent DDoS attacks have once again highlighted the importance of effectively managing cyber security risks.
Mike Sentonas |
17 Nov |
Read more
The security market today is flooded with hundreds of software tools, hardware appliances and cloud-based services.
Matt Brigham |
08 Nov |
Read more
Vulnerabilities Must be Monitored Too
Dick Bussiere |
08 Aug |
Read more
Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?
Ashwin Pal |
02 Aug |
Read more
Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many organizations, and relating all this data to the user’s account information in Active Directory can be tricky and time consuming.
Dean Wiech |
06 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
Gartner* believes that by 2020, 60% of organisations will use active social identity proofing and let consumers bring in social identities to access risk-appropriate applications. It also predicts that by 2020 new biometric methods will displace passwords and fingerprints for access to endpoint devices across 80% of the market.
Sumal Karunanayake |
31 Aug |
Read more
Data breaches have hit the news recently for all the wrong reasons. A major grocery chain has recently suffered a major data leak, the latest in a long line of businesses that have been forced into damage control mode after widespread dissemination of information that should never have entered the public domain.
Kieran O'Shaughnessy |
18 Jun |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more