During the years’ I’ve spent working in government I have witnessed interesting political shenanigans but I’ve never heard politicians put positive spin on a data breach or cyber crime. No one says out loud that we should stop worrying about computer network defenses or poor cyber hygiene.
Dan Lohrmann |
20 Apr |
Read more
Whoever said the best defence is a strong offence could have been thinking of protecting the enterprise from “advanced threats”. Given the stealth of today’s advanced attack malware, the scale of data compromise and speed of execution, it has been proven time and again that relying on a passive, defensive security strategy is no longer adequate.
Nick Race |
17 Apr |
Read more
The continuous coverage of network breaches and data leaks, indicates that information security has become a dangerous blind spot for many businesses. This is making it critical for CEO’s to familiarise themselves with their organisation’s internet security policies and procedures, as they become increasingly accountable for any failures.
David Higgins |
27 Mar |
Read more
The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.
Mark Gregory |
26 Mar |
Read more
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja |
26 Mar |
Read more
In an environment of unrelenting attacks, network packet capture and security analytics are essential for discovering the attack while it is in progress and to provide the intelligence to minimise the damage done as well as to prevent future attacks.
Scott Crane |
24 Mar |
Read more
DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.
Nick Race |
09 Mar |
Read more
The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.
Emmanuel Carabott |
09 Mar |
Read more
Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.
Ananda Rajagopal |
03 Mar |
Read more
Triple-A ratings are normally associated with Chief Financial Officers (CFOs) keeping a tab on John Moody’s bond credit rating. In the world of IT, it can be a platform for businesses to rate the efficiency of their IT security implementation.
Florian Malecki |
03 Mar |
Read more
We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.
Matt Miller |
20 Feb |
Read more
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner |
20 Feb |
Read more
With security breaches set to become more commonplace, enterprise IT teams have to be more vigilant and find new ways of combating these attacks. Cyberattacks on Australian companies, such as the recent hacking on major travel insurance company Aussie Travel Cover, have left many organisations feeling vulnerable.
Travis Greene |
18 Feb |
Read more
Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.
Anthony Stitt |
18 Feb |
Read more
As organizations try to rein in technology budgets, IT staff members are constantly tasked with doing more and providing better services, all the while keeping costs and staff to a minimum. Couple this with increased usage of applications in the cloud, and the security issues entailed therein and you have a perfect combination for delays and disgruntled users.
Dean Wiech |
16 Feb |
Read more
Every business holds at least some sensitive data. This may be sensitive personal information belonging to clients or employees, or confidential data relating to business operations. Keeping this secret information secret should be a concern to every business, no matter what industry or size.
James Billingsley |
30 Jan |
Read more
While most people today have a basic awareness of what augmented reality (AR) is, there’s a number of misconceptions about how widely the technology can be used
Michelle Goldsmith |
22 Jan |
Read more
For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
Steve Durbin |
13 Jan |
Read more
Mobile technology has redefined the way businesses operate, unleashing unprecedented levels of flexibility, collaboration and communication.
David Balazsy |
13 Jan |
Read more
Recently there has been an almost constant feed of news around distributed denial of service (DDoS) attacks, with banks, gaming organisations, governments, educational establishments and e-commerce vendors all being attacked. The DDoS threat has evolved considerably over recent years, with significant changes in the frequency and scale of attacks, and the motivations of cyber criminals. And, over a similar period, many organisations have become highly dependent on the availability of Internet services for their business continuity.
Nick Race |
12 Jan |
Read more