Every year is the same: the silly season comes, and with it so do the cybercriminals and phishing attacks. Last year was no exception, with Cyber Monday, Black Friday, Christmas and Boxing Day remaining on top of the list for hacking and phishing threats.
David Arthur |
22 Jan |
The digital revolution has been a catalyst for seismic change in the way healthcare is delivered but managing the security risks associated with this transformation remains a major headache for the sector.
Ken Pang |
02 Jul |
On 9th of January, SAP released its first set of security fixes (SAP Security Notes) for the year 2017.
Alexander Polyakov |
23 Jan |
Yesterday, the federal court handed down its decision on a thorny and controversial legal dispute between Telstra, the federal privacy commissioner and former technology journalist Ben Grubb over... I was about to write “his” metadata, but I can’t. The court has deemed that it’s not his or even about him.
Andrew Colley |
20 Jan |
Two of the most fundamental and perhaps difficult questions to answer in relation to information protection are:1.How do I know what to protect? 2.How do I go about protecting it?
Ashwin Pal |
19 Jan |
A lot has been said recently about IT security governance and IT security governance frameworks.
Ashwin Pal |
19 Jan |
We’ve entered the year faced with a wave of cybercrime attacks on healthcare organisations around the world, showing us yet again that healthcare continues to be a prime target for cyber criminals and Australian healthcare providers need to pay particular attention to security in order to protect themselves and their patients.
Zak Khan |
01 Apr |
Walls of greenery, circadian lighting and workspaces specially designed to accommodate activity-based working are just some of the features of Medibank’s new Docklands headquarters in Melbourne.
Chris Woodroffe |
03 Jul |
The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.
Mark Gregory |
26 Mar |
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja |
26 Mar |
For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
Steve Durbin |
13 Jan |
Last year, news that US retailer Target’s point-of-sale systems were compromised resulting in the theft of more than 40 million payment card numbers hit Australian headlines. A steady stream of breach stories throughout the year further raised awareness of the issue in this part of the world. But given there are no mandatory breach disclosure laws in this country, you may be wondering ‘If my details were stolen, how would I even know?’ Practically speaking, you’re probably thinking ‘What can I do to protect myself this festive season?’
Chris Pogue |
10 Dec |