Once an organisation establishes a a threat hunting program, its goal is to hunt threats proactively, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available.
Rick McElroy |
30 Nov |
Read more
Cybersecurity and ICT security talent is a highly sought-after commodity in today’s market, in Australia this seems to be driving up the cost for companies to actually obtain security talent.
Craig Ford |
25 Oct |
Read more
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara |
11 Oct |
Read more
With Australian businesses reporting over 114,000 incidents of cybercrime since 2014, 20 per cent of which have occurred in the past six months alone it is clear that the country is facing a very real and increasing threat, and is at risk of falling victim to major security incidents.
Les Williamson |
10 Aug |
Read more
One of the primary expenses that a small business might face is the cost of insurance. And if your business works within the digital world, you’ll not only have to purchase business insurance, but cyber liability insurance too.
Richard Laycock |
01 Aug |
Read more
Most high-profile attacks on corporate data centres and institutional networks have originated outside of the victimised organisations – in many cases from halfway around the world.
Steve Durbin |
06 Jul |
Read more
It’s not surprising that data breaches are slowly making their way up the list of business executives’ biggest fears.
Richard Laycock |
12 Jun |
Read more
In 1959, an IBM employee by the name of Arthur Samuel programmed a computer to play checkers against him. Over time, the program was able to collect data, strategise and win a game all by itself. And thus, machine learning was born.
Bryan Gale |
29 May |
Read more
Today, an array of ‘Security Innovation’ is happening. There has never been a time where there is more security innovation, and more security spend, as companies and corporations face greater chances of being cyber attacked. There is a new world we must secure - devices, apps (traditional and cloud native) and the cloud (managed, private and public).
Nathan Lowe |
18 May |
Read more
An interesting new phishing attack emerged last week, on Google Docs.
Rick McElroy |
12 May |
Read more
Organisations invest large amounts of money in cutting-edge security tools, but many tend to forget about one critical area: network visibility
David Higgins |
28 Sep |
Read more
Australia is going digital with a vengeance. According to IDC, as the country embraces the National Innovation and Science Agenda, 70% of Australian SMBs are already digitally transforming their operations.
Rob Malkin |
13 Sep |
Read more
Data breaches have hit the news recently for all the wrong reasons. A major grocery chain has recently suffered a major data leak, the latest in a long line of businesses that have been forced into damage control mode after widespread dissemination of information that should never have entered the public domain.
Kieran O'Shaughnessy |
18 Jun |
Read more
Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.
John Ellis |
15 Jun |
Read more
In a recent AustCert conference it was expressed to the CSO Editor that many struggled with "How to actually affect change in IT security behavior”. And not just "raise" awareness.
David Gee |
05 Jun |
Read more
Recently I started to use alternative search tools such as Duck, Duck Go and my old old favorite Yahoo. Why? Well I just was wary about all the information that is being collected by Google, and just wanted to see what it was like to revert to another tool.
David Gee |
01 Jun |
Read more
A mere handful of years ago, many of us were jealous of that one friend or coworker who was flashing their new iPhone, a mysterious gadget we couldn’t wait to get our hands on. Fast forward to the present, less than a decade later, it seems everyone you know owns a shiny new ultrathin phablet. Billions of people worldwide use smartphones, tablets, or phablets to run their personal and professional lives. They go with us everywhere, from bedside to kitchen table to workplace. This rapid rise of consumerised mobile technology has upended everything from our most intimate relationships to broader cultural dynamics.
Steve Durbin |
20 May |
Read more
IoT seems to be buzz word in IT and business at the moment. Simply put, IoT is defined as everyday objects with computing devices embedded in them that have a means to send and receive data over the internet.
Ashwin Pal |
20 May |
Read more
A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure. With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways
Gerardo Altman |
19 May |
Read more
Along with an Opex-leaning cost model, cloud computing’s appeal has included dynamic capacity provisioning where compute and storage resources can be added, moved and removed almost instantaneously.
Ian Teague |
18 May |
Read more