Industries — Opinions

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Role-based Access Control: Access, security, info tracking

Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many organizations, and relating all this data to the user’s account information in Active Directory can be tricky and time consuming.

Dean Wiech | 06 Apr | Read more

Do you have an Insider Threat Program?

Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.

David Gee | 01 Apr | Read more

Preventing phishing attacks

Phishing attacks have been there since the time authentication methods have been in place. An attack where the attacker tricks the victim into submitting their authentication credentials is termed as phishing attacks. With advancement of technology, the attacks also have been advancing, causing significant damage to the victims at times.

Shantanu Bhattacharya | 31 Mar | Read more

Why cybersecurity matters

Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.

David Kim | 06 Jul | Read more

The true cost of a data breach

There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations. Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?

Robert Parker | 07 Jul | Read more

A World without Identity and Access Governance

Imagine if the ability to assign and manage an employee’s application and data access disappeared overnight and all of your systems and data were left wide open to everyone in your organization. Needless to say, the fallout would be disastrous. Employees would be able to see each other’s salaries, confidential trade secrets would be readily viewable and open to the world and the threat of industrial espionage after an employee’s departure would increase exponentially.

Dean Wiech | 15 Jun | Read more

Seven things government security leaders expect vendors to address

p> Finally, the meeting has arrived.</p> <p> After many months of phone calls, e-mails, a WebEx demo and other prep work, you walk in the room and sit down with the government security leader and his or her team. Your hand-picked group of rock stars has been waiting for this moment. They even flew in early to practice the PowerPoint presentation.</p>

Dan Lohrmann | 26 May | Read more

Five Ways to Reduce the Cost and Complexity of Cyber Security

If it seems there are more cyber-security breaches in the news recently, there’s a reason. The volume of breaches grew at an alarming 48 percent in 2014, according to a recent global study by PwC. The study also found that total financial losses from security breaches increased 34 percent during 2013. One of the most staggering findings was that the number of organisations reporting financial losses over $20 million as the result of a cyber-attack grew by 92 percent over the previous year.

Paul Lipman | 28 Apr | Read more

Proactive web security with client reputational services

In 2014, several successful malicious attacks against large financial services, government and private sector firms gave a clear indication of the changes occurring in the network security industry. The recent Ponemon Institute Cost of a Data Breach study found the average cost of a data breach to be $3.5 million with average cost per compromised record more than $145.

Sudeep Charles | 27 Apr | Read more