Here’s a challenge. Take a nation with a population in excess of 1.2 billion people and create a database that gives each and every person a unique 12-digit identifier and stores their fingerprints, a photograph and their iris. The purpose is to provide secure authentication and access to services.
Anthony Caruana |
10 Oct |
Read more
Security firm Clearswift has acquired endpoint solutions developer Jedda Systems for an undisclosed sum.
Hamish Barwick |
10 Sep |
Read more
Cloud-computing consultancy Paradyne will offer its customers cloud identity and access management (IAM) tools from Centrify, giving that company’s cloud-based single sign-on (SSO) technology a big leg up in a local market where cloud-based services are rapidly gaining enterprise legitimacy.
David Braue |
03 Sep |
Read more
The inherently casual and decentralised nature of cloud services will increasingly push organisations to reconsider their identity and access management (IAM) infrastructure, an Ovum analyst has warned.
David Braue |
20 Aug |
Read more
The AusCERT 2013 security conference, which coincides with the government-sponsored <a href="http://www.staysmartonline.gov.au/awareness_week">National Cyber Security Awareness Week (NCSAW)</a>, dominated the news during the week, and the CSO Australia team was there in full force to hear the latest from industry experts from across Australia around the world.
David Braue |
27 May |
Read more
Mozilla Persona had one of its first conference Australian outings at AusCERT 2013, with software engineer on the project, New Zealand-based Francois Marier's tutorial on the architecture of the identity project.
Richard Chirgwin |
24 May |
Read more
The Labor government’s <a href=”http://www.cso.com.au/article/451494/pm_commits_1_46_billion_improving_cyber_security_networks/”>$1.46b commitment</a> to boosting cybersecurity efforts was a significant investment in an area where the ‘good guys’ have often seemed hopelessly outgunned.
David Braue |
31 Jan |
Read more
<p>
Workers have been agitating for bring-your-own-device (BYOD) strategies for some time now, but a <a href="http://www.cso.com.au/article/437901/workers_worried_by_byod_privacy_intrusions_survey/" target="_blank">new survey</a> suggests many are actually concerned that BYOD – which has <a href="http://www.cso.com.au/article/438290/interop_ny_security_top_byod_challenge/" target="_blank">already raised security issues</a> and is <a href="http://www.cso.com.au/article/438345/companies_won_t_choice_about_using_big_data_id_management/" target="_blank">forcing companies to invest </a>in sophisticated analytics – is giving management an excuse to <a href="http://www.cso.com.au/article/437915/byod_privacy_being_watched_/" target="_blank">snoop on their information</a>.</p>
<p>
David Braue |
08 Oct |
Read more
Banks wear the cost of online banking fraud against consumers, but do not for businesses which are often not told how it occurred or under what conditions reimbursements are given, says European Union security advisor, Marnix Dekker.
Liam Tung |
24 Sep |
Read more
Reports were questioning corporate security culture as KPMG suggested a lack of legislation around mandatory data breach notifications has <a href=“http://www.cso.com.au/article/435288/data_breaches_being_discussed_by_companies_report/”>left many Australian companies</a> tight-lipped on the subject.
David Braue |
13 Sep |
Read more
Microsoft’s SmartScreen ‘reputation checker’ is expanding from the Internet Explorer browser to the entire Windows 8 desktop, nudging developers to buy Extended Validation (EV) code signing certificates to reduce their chances of causing a security alert.
Liam Tung |
16 Aug |
Read more
We're all familiar with the notion that perimeter is disappearing from IT systems – but it's not a new phenomenon. In fact, the perimeter has been dissolving for years, says NetIQ's Ian Yip.
Richard Chirgwin |
26 Jul |
Read more
Adoption of identity and access management (IAM) standards may see social-network giants like Facebook and LinkedIn emerge as trusted identity brokers for everything from government transactions to financial services, a security expert has predicted.
David Braue |
25 Jul |
Read more
As the workforce becomes increasingly mobile and dispersed, identity and access management becomes more important in ensuring organisational security. While managing user identities and controlling access are separate tasks, they are closely related.
Gordon Makryllos |
04 Jun |
Read more
Today's sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.
CSO staff |
17 May |
Read more
Intrusion detection systems’ “needy and noisy” behavior is aligning with a serious, ongoing skills shortage in IT security to turn the IDS into a box that generates alerts which are largely ignored, he told delegates to AusCERT.
Richard Chirgwin |
16 May |
Read more
"Never waste a crisis," says Adobe's product security chief Brad Arkin. He says that with a smile today, but when he joined the company in late 2008 the crisis was very real and the outcome unknowable.
Stilgherrian |
13 Mar |
Read more
A lot has been written in the media recently about APTs, but there seems to be a level of confusion out there about what this phenomenon is and how this could affect us. Within this brief article, I shall try and shed some light on the phenomenon that is APTs.
Ashwin Pal |
29 Feb |
Read more
Start-up Click Security launches today with a threat-detection product that analyzes and correlates intelligence gathered by sensors on network traffic and activity to provide real-time alerts or even automate defense response to network intrusions or other security threats.
Ellen Messmer |
21 Feb |
Read more
GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research.
Bob Brown |
18 Feb |
Read more