Opinions — Opinions

Australians head toward the cloud

No matter what type of organisation you work for, it’s hard to escape the cloud computing discussion. Cloud computing offers unparalleled advantages in terms of scalability and cost benefits, and there is no denying that it has changed the very nature of IT and the way use technology in business.

Sanjay Mehta | 22 Nov | Read more

Making intrusion prevention and malware protection work together to combat modern attacks

There’s a lot of talk in the security industry and among organisations about the threats we face – malware, advanced persistent threats, zero-days, targeted attacks, viruses, Trojans, distributed denial of service attacks, worms, phishing...the list goes on and on. But no matter how you parse it, it all comes down to threats. More specifically, two fundamental types of threats: known and unknown.

Chris Wood | 14 Nov | Read more

De-risking the cloud

The attractiveness of adopting cloud services continues to grow. Who can argue against access to the latest technologies, a pay as you go model, rapid provisioning/de-provisioning and on demand scaling? All of these benefits lead to improved agility, faster time to market and a business focus on the business (not managing IT). Many of the risks of cloud computing have become less frightening as organisations have become more comfortable with data sovereignty and availability issues.

Wayne Tufek | 16 Oct | Read more

Upping the pace to face the infosec 'Cold War'

"We, as far as I'm concerned, are in an arms race. It's the same old thing as the good old days of the Cold War," says Dick Bussiere, principal architect for Tenable Network Security in the Asia Pacific region. "The Russians would come up with something, the Americans would come up with a countermeasure, the Russians would come up with something else, and it never ends. I think we're kind of in a situation like that."

Stilgherrian | 30 Sep | Read more

A beer with a CISO

A few weeks back I caught up with a mate of mine who is a CISO for a major international bank. We try to make the effort to meet regularly, and I never pass up the opportunity to ask him some tough questions—an insight to the challenges, trends and priorities of the Financial Services Industry (FSI) is always valuable. These privileged relationships are extremely useful for keeping your finger on the pulse.

John Ellis | 22 Aug | Read more

BYOD: Keep your ‘eyes on the enterprise’

Bring your own device (BYOD) will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organisation. We already know that these devices include tablets, including iOS and Android smartphones, “Wintel” laptops, but there are many devices we are yet to see.

Terry Steer | 19 Jul | Read more

Want to Strengthen Defences? Think Like an Attacker

The recent hike in the number and severity of cyber attacks around the world demonstrate that we are squarely in an era referred to as the “industrialisation of hacking” which has created a faster, more effective and more efficient sector profiting from attacks to our IT infrastructure. Driven by the desire for economic or political gain or attention to their cause, hackers are executing more sophisticated and damaging attacks that at the same time are becoming easier to launch with widely available tools.

Chris Wood | 08 Jul | Read more

Schneier joins EFF board in wake of NSA scandal

Renown cryptologist and security specialist Bruce Schneier has joined the board of the Electronic Frontier Foundation (EFF), one of the United States' longest-running and most influential digital rights and civil liberties lobby groups. It's a move that will boost the EFF's intellectual heft in policy debates about online surveillance and privacy issues, as well as their influence in Washington.

Stilgherrian | 28 Jun | Read more

Establishing a Cloud Broker Model – Part 2

In 1973 Peter Drucker in his book “Management Tasks and Responsibilities” defined strategic planning as: <i>“The continuous process of making present entrepreneurial (risk-taking) decisions systematically and with the greatest knowledge of their futurity..."

Puneet Kukreja | 04 Jun | Read more

Beyond BYOD: Securing the Mobile Workforce

Mobility is having a profound impact on how people live and work. The modern workforce expects to be able to work anytime, anywhere from any device on any application. The number of mobile-connected devices will exceed the world’s population this year. While most companies realize that Bring Your Own Device “BYOD” policies creates new risks, the plethora of challenges brought by mobility go far beyond BYOD. In fact, most organizations are still lagging behind on making the changes necessary to adequately address these challenges.

Craig Sprosts, VP, platform and applications, Nominum | 27 May | Read more

The Ins and Outs of Cloud and Outsourcing

The speed at which IT is developing and the general nature of modern business means that many enterprises rely on specialists to manage our systems and applications. Economic and competitive pressures have made it imperative for organisations of all sizes to focus on their core competencies and turn to third-parties to assume responsibility for key corporate functions. The most common form of outsourcing is the cloud. The cloud simplifies many aspects of IT and the business services world.

Gordon Makryllos | 21 May | Read more