Identity Management — Opinions

The week in security: Would you release malware on your network?

The week in security was dominated by Parliamentary dealings over the controversial ‘Encryption Bill’ that was pushed through into law – despite early and eventually fruitless stonewalling by Labor – without what many observers warned was adequate supervision and adequate controls despite revelations that previous controversial telecommunications data retention legislation was being abused.

David Braue | 11 Dec | Read more

Time is Your Foe and Automation is Your Friend during DDoS Attacks

During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.

Tim Murphy | 24 Apr | Read more

Protecting data means protecting business

​As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.

Manish Bahl | 26 Feb | Read more

Grappling with DevOps Security

As demands increase on speed to deliver new software, services and value are increasing for all enterprises, including government departments, banks, and critical infrastructure, the agile new development mode ‘DevOps’ is taking hold.

Elizabeth Lawler | 15 Feb | Read more