Security is everyone’s business
Whether you work for a big enterprise or small business, you have people that look after your IT and cybersecurity needs.
Craig Ford | 06 Dec | Read more
Whether you work for a big enterprise or small business, you have people that look after your IT and cybersecurity needs.
Craig Ford | 06 Dec | Read more
New Zealand releases its annual Cyber Threat Report detailing its work to combat state-backed hackers.
The Australian Cyber Security Centre (ACSC) as it sought to raise awareness and protection around the surging Emotet malware, which was fingered in the recent malware attacks on Victorian hospitals and nearly two dozen other Australian victims.
David Braue | 07 Nov | Read more
The overall risk posed by cybersecurity threats has increased over the past 12 months and adoption of cloud technologies is by far the biggest reason, according to new research that found just 31 percent of organisations can mitigate a new risk within a month.
David Braue | 07 Nov | Read more
Can the world handle the 'Donald Trump Screen of Death'?
Secrets allows users to easily and securely store passwords, credit card numbers, bank details, and other confidential information with OpenPGP and AES encryption.
J.R. Bookwalter | 21 Jan | Read more
As users what we want is to share more and have more privacy. It is through this prisoner dilemma that over this weekend Digi.me, ID Exchange and Alibaba Cloud joined forces to bring the power of personal data and private sharing to communities in regional NSW by delivering the digi.spark hackathon hosted at UTS as part of New South Wales Spark Festival.
Abigail Swabey | 28 Oct | Read more
And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.
Abigail Swabey | 23 Jun | Read more
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
Abigail Swabey | 24 Sep | Read more
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.
Joan Goodchild | 21 Jun | Read more
Prime Minister Julia Gillard was on hand in Sydney this week to launch a new cyber education module called bCyberwise. Developed by Life Education and McAfee, the program is designed to teach primary school students about online dangers such as becoming `friends' with strangers and cyber bullying. The program will be rolled out to Australian schools from 4 February.
Hamish Barwick | 17 Jan | Read more
The relationship between the CIO and CSO (or CISO) can be fraught with tension - and that can be a good thing. Both executives play a critical role in your organization's C-suite, and better understanding these sometimes overlapping roles can only make your business stronger and more secure.
Sharon Florentine | 23 Apr | Read more
A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?
Brian Eastwood | 26 Feb | Read more
Throughout 2019, technology has continued to have a transformative impact on businesses and communities.
Dave Russell, Veeam | 28 Nov | Read more
Has your organisation fallen victim to a hacking attack or serious data breach? They’ve become unremarkable occurrences in the digital era, in Australia and around the world.
Simon Howe | 04 Jul | Read more
The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data.
David Shephard | 04 Jul | Read more
The traditional focus of IT security has been on keeping out external threats, but the volume and frequency of security breaches caused by disgruntled, careless or negligent insiders has risen significantly in recent times.
David Shephard | 01 Jul | Read more
WARNING! Spoilers for Endgame ahead.
Thomas LaRock | 24 Jun | Read more