In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
Nick Race |
12 Apr |
Read more
Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many organizations, and relating all this data to the user’s account information in Active Directory can be tricky and time consuming.
Dean Wiech |
06 Apr |
Read more
We’ve entered the year faced with a wave of cybercrime attacks on healthcare organisations around the world, showing us yet again that healthcare continues to be a prime target for cyber criminals and Australian healthcare providers need to pay particular attention to security in order to protect themselves and their patients.
Zak Khan |
01 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
There is an undeniable shortage of Cyber Security resources in Australia and the short-term answer has to be to bring talent in from other countries.
David Gee |
31 Mar |
Read more
Phishing attacks have been there since the time authentication methods have been in place. An attack where the attacker tricks the victim into submitting their authentication credentials is termed as phishing attacks. With advancement of technology, the attacks also have been advancing, causing significant damage to the victims at times.
Shantanu Bhattacharya |
31 Mar |
Read more
Barely a day goes by without new reports of organisations falling victim to cyber-attacks. Data breaches, network outages and system disruptions have become an unfortunate reality of the modern digital world.
David De Laine |
31 Mar |
Read more
We all have many cyber security tools and the sad truth is that breaches and vulnerabilities still take a long time to be detected and re-mediated. The quoted data is that it takes around 252 days to detect then a further 82+ days to resolve.
David Gee |
30 Mar |
Read more
Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.
David Kim |
06 Jul |
Read more
There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations.
Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?
Robert Parker |
07 Jul |
Read more
Walls of greenery, circadian lighting and workspaces specially designed to accommodate activity-based working are just some of the features of Medibank’s new Docklands headquarters in Melbourne.
Chris Woodroffe |
03 Jul |
Read more
A sector as big as e-commerce, which grew at a rate of 9 per cent in Australia from 2014, warrants a very serious discussion regarding purchase security. Online shopping has become a favoured avenue because of convenience, variety and competitive pricing, yet the safety of payment practices is still being worked out.
Jessica Mayfield |
03 Jul |
Read more
Imagine if the ability to assign and manage an employee’s application and data access disappeared overnight and all of your systems and data were left wide open to everyone in your organization. Needless to say, the fallout would be disastrous. Employees would be able to see each other’s salaries, confidential trade secrets would be readily viewable and open to the world and the threat of industrial espionage after an employee’s departure would increase exponentially.
Dean Wiech |
15 Jun |
Read more
In a recent AustCert conference it was expressed to the CSO Editor that many struggled with "How to actually affect change in IT security behavior”. And not just "raise" awareness.
David Gee |
05 Jun |
Read more
In this ever changing and quickly evolving political landscape that the world operates under, should we be increasingly concerned of cyber-attacks and fraud as more nations remove themselves further and further from communism?
Thomas Booth |
01 Jun |
Read more
p>
Finally, the meeting has arrived.</p>
<p>
After many months of phone calls, e-mails, a WebEx demo and other prep work, you walk in the room and sit down with the government security leader and his or her team. Your hand-picked group of rock stars has been waiting for this moment. They even flew in early to practice the PowerPoint presentation.</p>
Dan Lohrmann |
26 May |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more
Along with an Opex-leaning cost model, cloud computing’s appeal has included dynamic capacity provisioning where compute and storage resources can be added, moved and removed almost instantaneously.
Ian Teague |
18 May |
Read more
If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.
Paul Lipman |
28 Apr |
Read more
In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.
Sudeep Charles |
27 Apr |
Read more