Identity & Access — News

Identity is the Key to Security

Security is big business these days. With our old approach of blocking everyone at the border failing - mainly because no-one knows where the border is anymore - a risk-based approach is driving the way businesses think about their information and systems security.

Anthony Caruana | 22 Oct | Read more

The week in security: Apple security scrutinised as mobile, IoT threats loom

The role of government in cybersecurity defences continues to morph, but there were interesting revelations that GCHQ employs 120 dyslexic and dyspraxic analysts to help in its fight against terrorism, while British PM David Cameron appointed a special envoy in charge of intelligence and law-enforcement data sharing. Interestingly, however, even as scrutiny of data sharing increases, Yahoo! reported that government requests for data had dropped overall, while one Australian cybersecurity expert said businesses and governments were increasingly seeking a collaborative approach to bolster overall cybersecurity profiles.

David Braue | 02 Oct | Read more

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

Brad Chacos | 22 Aug | Read more

ABS: Agile for the long haul

The Australian Bureau of Statistics has been using Agile methodologies for around seven years, but has more recently widened its adoption as part of a broader transformation within the organisation, assistant statistician and head of technology engagement and design Lane Masterton told an audience at the Technology in Government 2014 Summit last week.

Stephen Withers | 13 Aug | Read more

Wearable Tech - Can your life be hacked?

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

Anthony Caruana | 07 Mar | Read more

Online threats driving password-management acceptance: Siber

No CSO would be unaware of users' resistance to complex and often arbitrary password-management schemes, but one password-management vendor believes the battle is not yet lost as the slowly-expanding profile of password-management tools gives enterprises large and small the ability to help employees manage a swag of complex online passwords.

David Braue | 07 Jan | Read more

2014, the year that infosec gets political

2013 has certainly been a watershed year for information security. But to understand how things might subsequently unfold in 2014, it's worth remembering that each and every revelation of 2013 will be processed and acted upon by humans. Humans with their unchanging human nature, and organisations created by us humans, with their similarly unchanging nature.

Stilgherrian | 06 Jan | Read more