As organisations grapple with the opportunities and challenges posed by digital transformation, many are realising the important role identity management will play.
Mark Perry |
23 Feb |
Read more
The CSO of identity management vendor, Okta, says that security professionals need to do a better job in understanding their organisation’s wider business before presenting their risk assessment to upper management or at the board level.
Krishan Sharma |
05 Oct |
Read more
By now all of you must have heard about the debacle that is the latest census. The intent of going electronic was right, but the execution left a lot to be desired!
Ashwin Pal |
16 Aug |
Read more
Lack of funding, resulting from poor business alignment, is the biggest risk facing any security program.
Frederick Scholl |
15 Jun |
Read more
These terms should look familiar. They're similar to the common terminology used to discuss the identity and access management (IAM) infrastructure, but something is different.
Pam Dingle |
30 May |
Read more
As the Manager for IT Security and Identity Services at Griffith University, Ashley Deuble has to manage a complex environment with a massive number of internal and external users.
Anthony Caruana |
25 May |
Read more
Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.
Taylor Armerding |
06 Oct |
Read more
If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.
David Gee |
02 Jun |
Read more
Google has added humans to its app review process to weed out malware, sexually explicit content and other violations, and has tightened its content rating system.
Liam Tung |
18 Mar |
Read more
The OpenSSL project has kicked off the new year with fixes for handful of bugs that fortunately are not as disastrous as Heartbleed or POODLE.
Liam Tung |
09 Jan |
Read more
One in four young adults is interested in a career in cybersecurity, a new survey has found, but two-thirds said their high schools weren't providing appropriate teaching to foster their entry into a market that is growing 3.5 faster than the overall IT job market.
David Braue |
03 Oct |
Read more
As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.
Gordon Makryllos |
24 Sep |
Read more
I have been reading about the upcoming retirement of support for the Microsoft Server 2003 operating system (OS). One author felt that organisations will probably mismanage the retirement of the OS, like many did with the retirement of Windows XP.
Paul Angus |
18 Aug |
Read more
Organisations are increasingly adopting a model in which multiple access control use cases and identities can be supported on one card or smartphone.
Steve Katanas |
30 Jul |
Read more
Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.
Dr Claudia Johnson |
26 Jun |
Read more
Heartbleed wasn't just an interesting Internet security story. It was a sign that one of the most fundamental building blocks relied on by many large companies was significantly flawed. Even more staggering was the revelation that the OpenSSL open source code library, that is responsible for SSL communications between systems, had another flaw that went undetected for over a decade.
Anthony Caruana |
24 Jun |
Read more
A recent report released by the World Economic Forum (WEF) focused on the Global Agenda for 2014 and the top 10 trends facing the world. As one might expect, topping the list were globally pertinent and vital topics like; growing societal tensions in the Middle East and North Africa; income disparity around the world; and ongoing unemployment.
Gordon Makryllos |
20 Jun |
Read more
Every time a revolutionary technology comes into being, basic questions such as 'do we really need this technology?' or 'how can we ensure that new technology can be put to right use?' will give raise to concerns about privacy and security.
Dushyant Sattiraju |
28 May |
Read more
The digital tsunami and the move to mobile have changed the way we work forever. It is not all that long ago that we accepted our jobs as being part mobile – or at least where you could get a signal – and part tied to a desk. But no more; mobile is the new normal, it is here to stay, and the ‘workplace’ has become something altogether new and different.
Gordon Makryllos |
28 May |
Read more
The physical security world has been in the midst of a significant change over recent years. Old security cameras, that could be connected with a coaxial cable and some power, are giving way to IP enabled devices. This has lead to a complete rethink on how security systems are designed, deployed, operated and maintained.
Anthony Caruana |
10 Apr |
Read more