Opinions — Opinions

Redefining BYOD

More companies are seeing the benefits of allowing their employees to bring personally owned devices into the workplace and onto the corporate network. The familiarity of having your own smartphone for work means that you can work faster and, perhaps cynically from the employer’s perspective, that you are far more likely to work longer.

Rik Ferguson | 13 Nov | Read more

Symantec's Sydney SOC surge sounds suspiciously so-so

Symantec's so-what launch of a minor facilities upgrade in Sydney illustrates a key problem facing all information security vendors. How do you convince the pointy-haired bosses to go for your company's tender when it's almost impossible to reveal any meaningful comparisons with the competitors?

Stilgherrian | 20 Sep | Read more

The magic of mobility vs the safety of security

Mobility has become a key part of business operations in recent years. Smartphones and tablets have become an accepted part of everyday business as the workforce becomes more and more dispersed, with managers expecting their employees to remain connected and productive while they are away from the office.

Gordon Makryllos | 12 Sep | Read more

Think cloud – think strategy – think "Sun Tzu"

The steady rise of cloud over the last few years across the software, infrastructure and platform domains has forced most technology business leaders to stop and take note. The voracity with which the perceived value and adoption of cloud computing and cloud Services has grown should be viewed and actioned as a strategic initiative and not a tactical undertaking with short term goals and limited benefits. To move things along and provide context I turn to Sun Tzu's "The Art of War", that helps identify strategy elements required by executives and senior management grappling with the challenge of cloud.

Puneet Kukreja | 31 Aug | Read more

Managing the mobile security paradigm

There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.

Gordon Makryllos | 09 Aug | Read more

Part 1:The business drivers and technology basics of two-factor or multi-factor authentication

The Prime Minister’s Department invited submissions to “Cyber Security White Paper” late in 2011. This is Brass Razoo’s submission that prosecuted the case for Australia to adopt a federated multi-factor authentication that could be deployed nationally. By extending existing identification systems administered by Government and Financial Service providers, the nation could build an identification and security system that would be the envy of the world.

Mike Ryan | 07 May | Read more

Security complexity threatens enterprises

Information security is one of the biggest challenges facing enterprises this year. Being hacked by criminals is becoming depressingly familiar for a many businesses. A roll call of prominent brands has succumbed to what is an unprecedented number of attacks. Increasing threats, regulations and complexity have catapulted network security up the corporate agenda. Considering billions are being spent on cyber security each year, why are businesses continuing to fall victim to cyber attacks?

Gordon Makryllos | 23 Apr | Read more

Security surveillance gets smarter

Australia has come a long way since the first closed circuit television (CCTV) security camera was installed in Melbourne in 1981 to help support a Commonwealth Heads of Government Meeting. In the twenty years since, those humble analogue installations have transformed into modern high resolution, networked-enabled, digital systems.

Scott Basham | 30 Mar | Read more

Embracing the Cloud – A Decision Framework

With major restrictions and inherent limitations in most IT environments, it’s become an attractive option for businesses. Concerns such as spending restrictions; immature capacity management; uncertain demand forecasting; duplication of capability; slow delivery of infrastructure and slow business application delivery all lead businesses to look wistfully at cloud computing.

Puneet Kukreja | 19 Mar | Read more

Safeguard security with gateway consolidation

Just like the doors to your house, your internet gateways are the one point where you can see (and decide) what comes in and out. The gateway is exposed to all sorts of security threats, from hacking attempts, to spam, phishing and viruses. It’s critical that you define clear security rules for your gateways and deploy corresponding processes to keep them up to date.

Gordon Makryllos | 07 Mar | Read more

Trend Micro Develops Advanced Cloud-Based Mobile App Scanning Technology

Trend Micro, a global cloud security leader, today announced a technology breakthrough for application users. Mobile App Reputation is the first technology in the industry that can automatically identify, analyse and rate mobile applications for issues that could include malware, potential theft of private data and system resource abuse including battery, memory, and bandwidth.

Glynn Stokes | 16 Feb | Read more

Opinion: Use It, Don’t Lose It: Keeping Your Business Data Safe

Some things are meant to go together. Coffee and laptops isn’t one of them. Spilling a drink on a keyboard is just one of many ways people lose vital business data. Other hazards include hardware and software failure, viruses, accidentally deleting a file, fire and theft. Yet more than one in three Australian businesses (36%) do not have an offsite backup strategy to protect their data, according to a survey* by backup specialist Acronis.

CSO staff | 13 Sep | Read more

Vendor Opinion: Is your Security as good as the Cloud’s?

For many businesses taking their first tentative steps into the brave new world of cloud computing, the $64,000 question is: “How secure actually is the cloud?” While Gartner advocates that cloud computing should be the number one priority for CIOs in 2011, the analysts also recognize that security and privacy are critical concerns for those considering adoption of cloud-based technologies.

Dave Asprey | 25 Jul | Read more

Opinion: Fighting the botnet threat



ISPs in Australia have for some time been notifying users about the likelihood that their computers have been compromised by malware. Now under the icode, the system has been formalised. Education and remediation tools are being made available to suspected victims.

Peter Coroneos | 22 Jul | Read more

Opinion: Cyber-Security – Stay Smart Online

Australians are increasingly relying on the internet in their everyday lives, from banking and shopping, through to using emails, social networking and blogs to keep in touch with family and friends. They are using a range of devices such as smart phones, tablets, computer game consoles and other devices to go online.

Sabeena Oberoi | 15 Jul | Read more