Security – Where to Start?
Two of the most fundamental and perhaps difficult questions to answer in relation to information protection are:1.How do I know what to protect? 2.How do I go about protecting it?
Ashwin Pal | 19 Jan | Read more
Two of the most fundamental and perhaps difficult questions to answer in relation to information protection are:1.How do I know what to protect? 2.How do I go about protecting it?
Ashwin Pal | 19 Jan | Read more
A lot has been said recently about IT security governance and IT security governance frameworks.
Ashwin Pal | 19 Jan | Read more
To understand what’s coming in 2017 in the worlds of data privacy, information security, and digital identity, we need to understand the implications of a handful of developments that happened in October 2016.
John Donovan | 14 Dec | Read more
It’s no secret that the threat of cyber-crime in Australia is on the rise. Last year, the number of cyber-threats more than doubled.
Dan Slattery | 08 Dec | Read more
The ineffectiveness of traditional antivirus (AV) , which catches less than half of noteworthy malicious events, is causing untold damage to organisations worldwide
Kane Lightowler | 08 Dec | Read more
The integrity of information will be one of the biggest challenges global consumers, businesses and governments face in 2017, where information from previously venerated sources is no longer trusted.
John Worrall | 06 Dec | Read more
Conventional wisdom has it that SaaS vendors – that is, those that market cloud-based software-as-a-service – often maintain higher levels of information security than their clients.
Jim Buchanan | 30 Nov | Read more
Imagine life without our smartphones, tablets, digital televisions and the Internet. We would still be stuck in the early 90s.
Nathan Lowe | 29 Nov | Read more
Another year is drawing to a close. We often hear the phrase, “Where does the time go?” when we look back on the year that’s gone.
Leon Adato | 28 Nov | Read more
It’s no secret digital technologies have changed everything.
Joshua Kennedy-White | 25 Oct | Read more
As commerce continues to shift online, IT managers are finding themselves juggling two competing priorities.
Mark Perry | 14 Oct | Read more
A hospital staff member, expecting delivery of an online purchase, opens an email claiming to contain details of a parcel delivery.
Nathan Lowe | 12 Oct | Read more
Cyber-attacks continue to become more advanced and sophisticated than ever before.
Steve Durbin | 11 Oct | Read more
The importance of context should never—ever—be underestimated. Put up a sign across a path saying “Keep Out” and you can guarantee it will be ignored, and by a sizeable majority.
Maurizio Canton | 02 Sep | Read more
Every organisation is facing a new set of security challenges as they amass data says Nuix's Jim Kent.
Paul Wallbank | 25 Aug | Read more
I’m posting this story from London a few minutes after Prime Minister David Cameron announced his resignation following the decision to exit the EU. What is the implication of this momentous vote on Britain?
Australian companies are seriously lagging behind their US and UK counterparts when it comes to cyber security. According to Deloitte, Australian companies could risk becoming “low-hanging fruit” for cyber criminals due to a lack of education and an unwillingness to properly deal with cyber threats.
Liam Rowland | 27 Apr | Read more
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
We all have many cyber security tools and the sad truth is that breaches and vulnerabilities still take a long time to be detected and re-mediated. The quoted data is that it takes around 252 days to detect then a further 82+ days to resolve.
Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.