CSOs that take a reactive approach to security are setting themselves up to fail in the face of attacks from an increasingly agile and professional cybercrime industry, warned speakers at a packed Security Innovation Day that helped to kick off the Cisco Live! 2017 conference in Melbourne.
David Braue |
09 Mar |
Read more
If you're worried about getting owned by hackers, it's probably better to keep your communications to mobile devices.
Liam Tung |
09 Mar |
Read more
Mozilla's Firefox 52 hits key milestones in its plan to improve security for users.
Liam Tung |
08 Mar |
Read more
If you’re a security executive new to an organization you know better than most that you often suffer from not knowing the state of your security posture and because of this you are forced to operate tactically. What’s needed is a baseline about the current state of your security posture across people, process and technology which ultimately alleviates headaches and allows you to approach security more strategically.
Brian Contos |
07 Mar |
Read more
Chief Information Security Officers are a relatively rare breed. Information security is, after all, a relatively recent addition or subset to IT, and while most large organizations now do profess to having a CISO, CSO or head of information security, many still don’t. Indeed, it’s often the case that a company appoints its first CISO in the aftermath of a data breach - like Target did in 2014 or Sony in 2011.
Doug Drinkwater |
07 Mar |
Read more
An influential consumer testing publisher is adding cybersecurity to its roster of factors to test in consumer products.
Liam Tung |
07 Mar |
Read more
Australian businesses are struggling to sell roles in ICT – and, even more problematic, in cybersecurity – to women, and one female cybersecurity wonk believes the problem is that too many young women aren’t being encouraged to ask questions more proactively.
David Braue |
06 Mar |
Read more
Chinese researchers are also cleaning up in Google's Android vulnerability rewards program.
Liam Tung |
03 Mar |
Read more
Zero-days, SQL injection, memory overflows and other kinds of creative abuse in the digital domain are a huge concern for many Internet-facing organisations. Commonly, a large proportion of IT budgets are bent towards ways to protect against these threats. Organisations deploy everything from IPS, IDS, SIEM, anti-virus and vulnerability scanners to look for the proverbial needle, and in many cases it’s a core function of IT security’s mandate. Rightly so, as it is an important and timely concern, but should this be our top priority?
Craig Dore |
02 Mar |
Read more
CSOs should look past ineffective “compliance mentalities” and treat the looming introduction of breach notification laws as an opportunity to destigmatise security breaches in order to build a more open, consultative culture amongst employees, according to the regional head of one large-scale security advisory.
David Braue |
02 Mar |
Read more
A growing governmental focus on cybersecurity issues has contributed to a marked upswing in cybersecurity investment that is now often being driven from the board level, according to the head of Cisco Systems’ local security business.
David Braue |
02 Mar |
Read more
Researchers find dozens of cybersecurity flaws in home and industrial robot components.
Liam Tung |
02 Mar |
Read more
Managed cloud services may be helping all kinds of businesses expand into new operational areas – but it’s CSOs that are in the firing line as they face the challenge of securing not only their own infrastructure, but the customer-facing services that lie at the heart of the company’s digital transformation.
David Braue |
01 Mar |
Read more
The Internet of Things continues to promise to be one of the biggest challenges facing security professionals with a new global study confirming widespread abuse of the new devices and systems.
Andrew Colley |
01 Mar |
Read more
Destiny Bertucci always knew she had a different way of looking at things than the students around her. While her classmates were often reticent in class and waited until after it was finished to approach the teacher with questions, Bertucci was always ready to dive into discussions and ask the hard questions.
David Braue |
28 Feb |
Read more
Australian businesses need to stop talking about diversity and undertake concrete steps to remedy the chronic under-representation of women and minority groups within ICT roles, an Australian Computer Society (ACS) executive has warned as figures suggest that efforts to attract women to ICT-related roles continue to flounder.
David Braue |
27 Feb |
Read more
Russia’s cybersecurity activities have been the stuff of rumour and innuendo recently, but the country is even apparently being scapegoated by malware authors who are inserting poorly-constructed Russian words as decoys.
David Braue |
27 Feb |
Read more
Looming mandatory breach notification laws have given Australian CISOs an opportunity to raise their organisational visibility by actively engaging users to build a culture in which data is classified and managed by default.
David Braue |
23 Feb |
Read more
Upspin may help consumer share files securely but developers will need to figure out how to make it useful.
Liam Tung |
23 Feb |
Read more
Businesses and government organisations face a growing threat from freelance cybercriminals, one former US Department of Justice attorney has warned as turncoat security experts cause problems such as the recent malware attacks on Polish banks. No wonder financial giants are exploring the potential of Blockchain to improve the protection of data from manipulation and fraud.
David Braue |
22 Feb |
Read more