Industries — Opinions

Cyber Security and the CIO Challenge

Cyber security is the double edged sword of modern business. Because the Internet is an evolving technology that carries enormous potential and vulnerability, cyber security embraces questions of internet freedom, network architecture and the economic potential of cyberspace

Gordon Makryllos | 09 Apr | Read more

Establishing a Cloud Broker Model – Part 1

Information Security, IT Security, Technology Security, IT Risk and Security and IT Risk Services are all names that organisations use to define a functional unit within their enterprise that is responsible for the security, integrity and operational assurance of their information assets and operating environment.

Puneet Kukreja | 15 Mar | Read more

How to secure an outsourced project

Despite our desire for simplicity, IT continues to become more complex. Decentralised applications or client-server models have become the norm. Smartphones and tablets are pushing mobile computing into a new era and changing user behaviour. Cloud has significantly altered the way we provide IT solutions and how we meet business needs with technical solutions.

Gordon Makryllos | 30 Jan | Read more

Close the Interwebz?

In my last CSO blog I posted about the Australian Federal Governments recent proposal that requires Internet Service Providers to retain their customers’ activity logs for a period of two years.

Matt Tett | 05 Dec | Read more

The threat landscape: the next trends in cyber security

Cyber security remains one of the most dynamic fields within the technology industry. Because of the financial and political impact of cybercrime, attackers are continuously looking to innovate and outsmart security vendors and consulting companies. As a result, the IT community is perpetually engaged in a contest of strategy to combat new cyber threats. These are some of the top security threats we can expect to see developing over the next year, including top tips to combat these dangers.

Gordon Makryllos | 05 Dec | Read more

The magic of mobility vs the safety of security

Mobility has become a key part of business operations in recent years. Smartphones and tablets have become an accepted part of everyday business as the workforce becomes more and more dispersed, with managers expecting their employees to remain connected and productive while they are away from the office.

Gordon Makryllos | 12 Sep | Read more

Managing the mobile security paradigm

There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.

Gordon Makryllos | 09 Aug | Read more

Opinion: How safe is your customer identity data?

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

Anton Koren | 14 Jul | Read more

Opinions: Even More Reason to Get Protection

Most modern day cyber attacks tend to target organisations and governments with the explicit purpose of stealing information and causing disruption. As a consequence, governments have had to reassess their stance on cyber crime, and many are attempting to tackle the problem directly.

Ian Hyndman | 11 Jul | Read more