2018: The year of the global crackdown on data security policy
It seems not a day goes by without another report of a high-profile cybersecurity breach affecting companies worldwide.
Bede Hackney | 18 Dec | Read more
It seems not a day goes by without another report of a high-profile cybersecurity breach affecting companies worldwide.
Bede Hackney | 18 Dec | Read more
Ever heard of Captain Richard de Crespigny? He may not be a household name like Captain Cook but he is no less of a hero. de Crespigny was the pilot who successfully steered an Airbus A380 to safety after it suffered engine failure over Singapore in 2010. His actions saved 469 lives.
John Karabin | 04 Dec | Read more
The world is evolving and so is the way modern business operates when it comes to security; security teams now have to manage multiple systems, devices and data, stored both onsite or in the cloud.
Andrew Souter | 21 Dec | Read more
As organisations embrace the concept of digital transformation, they’re finding new ways to digitalise old processes.
Philip Dimitriu | 19 Dec | Read more
Once an organisation establishes a a threat hunting program, its goal is to hunt threats proactively, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available.
Rick McElroy | 30 Nov | Read more
It’s been a big year in the cyber-security sector. Attacks on individuals and enterprises have become ever more frequent and the tactics employed by hackers and cyber-criminals ever more innovative.
Phil Kernick | 26 Nov | Read more
Australia’s second ever cyberwar games took place in Sydney last month. Codenamed “Operation Shell Breaker”, Government representatives from Human Services, the Australian Tax Office and Home Affairs came together with corporate representatives from the banking, telco and energy sectors to take turns to attack and defend critical infrastructure networks on a Lego smart city.
Sam Ghebranious | 26 Nov | Read more
Since the advent of cloud, organisations have been adopting it because its agility and flexibility can contribute to greater organisational efficiency and stronger performance.
Mauricio Sabena | 23 Nov | Read more
Aftershocks from the Cambridge Analytica data breach are still being felt around the world. While global scandals like these spring to mind when people think of ‘hacking’, the fact remains that cybercriminals pose a risk to all online users and businesses, regardless of geography.
Yannick Townsend | 26 Nov | Read more
Australian businesses have been affected by more than 300 cybersecurity breaches in 2018, according to The Office of the Australian Information Commissioner (OAIC).
Yannick Townsend | 23 Nov | Read more
It’s time to be honest with ourselves – security can be a difficult industry to be in. In-house and third party cybersecurity experts have a ton of responsibilities and work in a hard-to-understand field with lots of real world consequences.
Yuval Cohen | 19 Nov | Read more
The dawn of a new year traditionally sees individuals resolving to abandon bad habits or adopt virtuous new ones. On the cyber security front, many Australian businesses would do well to turn over a new leaf in 2019.
Michael Warnock | 19 Nov | Read more
Whether it’s a smart door that can be programmed to unlock specifically for friends and family while you’re at work, or a connected collar for your dog that tracks its location, modern consumers are embracing the new world of IoT.
Bogdan Botezatu | 16 Nov | Read more
Every time you connect to the internet, whether it's from a computer, tablet, or smartphone, you are vulnerable to cyberattacks from outside threats and hackers.
Sam Bocetta | 16 Nov | Read more
During a recent trip to the Gartner Security and Risk Summit in Sydney, I attended a session on how to select a Managed Security Service Provider (MSSP), which had some really good points on what customers need to understand when evaluating an MSSP.
Anshul Pandey | 15 Nov | Read more
Days like Melbourne Cup Day are almost synonymous with the concept of ‘downtime.’ A day like today truly stops the nation, with almost everyone tuning out from their day-to-day to tune in to Australia’s most expensive horse race of the year.
Nathan Steiner | 06 Nov | Read more
There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle.
Mick McCluney | 02 Nov | Read more
The first documented Internet of Things (IoT) cyber-attack took place in 2014, when a smart refrigerator had been caught red-handed for spawning over 750,000 spam emails after being hijacked by a botnet attack.
The annual national conference of the Australian Information Security Association (AISA) saw hundreds of cybersecurity professionals converge on the Melbourne Convention and Exhibition Centre – including several dozen students who rocked up to meet peers and recruitment-minded sponsors for the latest 24-hour Cyber Security Challenge Australia (CySCA) competition.
David Braue | 15 Oct | Read more
Are you aware that every week, thousands of profit-making and non-profit making organizations migrate to the cloud? In the last decade, millions of companies and other forms of organizations embraced the use of cloud computing, and the trend will undoubtedly continue in the next few years.
Rilind Elezaj | 10 Oct | Read more