Five years ago we knew changes in technology and the ways in which we do business would present enormous challenges for how IT manages identity, what we didn’t know, was just how fast these changes would take place. By 2015 Gartner forecasts Identity as a Service (IDaaS) will make up 25 per cent of the Identity and Access Management (IAM) market, up from just four per cent in 2011.
Graham Pearson |
28 Nov |
Read more
Most organisations are unaware of the need to bring darknet expertise in-house to ensure that there will be no surprises bubbling out of the darkness. The darknet does not have a pretty face, but it is not entirely evil either; so what is it that your organisation should know about the darknet, and why?
Mark Gregory, RMIT |
24 Nov |
Read more
R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.
George Fong |
21 Nov |
Read more
The retail industry is a prime target for fraud and data breaches – it is the second most targeted sector aside from finance.
Rick Chavie |
18 Nov |
Read more
The biggest cyber-security threat to your business is the people within it. That’s right – the same employees whom you rely on for productivity and profits are also a major weakness when it comes to protecting your operations and information.
Nicole Pauls |
18 Nov |
Read more
All of us are, to some extent, slaves to technology. Judicious use of technology is mandated. Human kind has, so far, been naïve in adopting technology with the presumption that it will always be used in the right spirit, but we have seen it being used in the wrong context over and over again. This article is about the implications of malicious use of pervasive technology.
Shantanu Bhattacharya |
13 Nov |
Read more
Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.
Steve Durbin |
13 Nov |
Read more
According to figures from the Australian Bureau of Statistics, 83% of the Australian population accessed the internet last year, and in the workplace, more and more time is spent online.
Andrew Avanessian |
11 Nov |
Read more
Smart city projects are among the most exciting technological initiatives around today and will play a major role in the world’s future growth and security. Modern technology lets us track and monitor many elements in a major urban environment – noise, light, traffic, weather, accidents and incidents, and use this data to improve people’s living and working conditions.
Gordon Makryllos |
24 Oct |
Read more
Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.
Dr Claudia Johnson |
23 Oct |
Read more
When it comes to network security, preventive measures like firewalls are necessary, but they’re not enough.
Jason Riddle |
22 Oct |
Read more
Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.
Brett Moorgas |
08 Oct |
Read more
Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.
Wana Tun |
03 Oct |
Read more
It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism
David Balazsy |
03 Oct |
Read more
What is cyber crime? There are a number of different ways that criminals are trying to target financial institutions. There is social engineering exploits, which is when an end-user gets an email claiming to be from their bank, but it’s really a cyber criminal. Within that email there is a link asking the end-user to confirm their account information. Cyber criminals then leverage the credentials to gain access to the user’s financial records and banking accounts. Malware is another piece to it, where criminals distribute malicious software and a user is tricked into installing a keylogger or screen scraper program on their device. This means that when an end-user enters their credentials, the program can capture all that information, allowing criminals to gain access to the account.
Crispin Kerr |
03 Oct |
Read more
The revelation of serious long-term vulnerabilities in the popular Ruby on Rails web programming framework is just one of three events in the last 72 hours that have convinced me that improvement in web application security is impossible -- unless both developers and business managers seriously lift their game.
Stilgherrian |
11 Jan |
Read more
Your board and audit committee are looking for reduction in risk exposure driven by your information security policy. Is this something you can track and measure?
Mark Ames |
08 Jul |
Read more
The global release of Microsoft’s Office 365 last week has raised a simple, sobering thought about dealing with US Cloud providers – they are subject to the US Patriot Act and the data they manage may be accessed by the US government regardless of where it is stored around the world. Before CIOs shun Cloud services altogether, let’s put the news in context.
Rodney Gedda |
04 Jul |
Read more
We like our risk management, don’t we? It allows us to identify risks, and take action to mitigate them. Risk Management can and should be applied to social media usage. It makes good sense to manage the risk by having a very clear social media policy.
Breed Lewis |
12 Mar |
Read more