There's been a significant shift in cyber-attacks over recent years. Although we often call this change an increase in sophistication, it's really a response to how security strategies have been developed and executed.
Anthony Caruana |
25 Oct |
Read more
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek |
15 Sep |
Read more
“When you look at international organised crime, it’s worth about $1.7 trillion a year. It’s made up six or seven key components. Those are things like counterfeiting, arms trade, drugs, people trafficking and smuggling, the sex trade,” he says.
Anthony Caruana |
31 Aug |
Read more
Accenture's acquisition of Australian security innovator Redcore is the latest in a series of strategic moves by major consulting firms that are filling out their capabilities in areas of fast-growing demand including cybersecurity and the Internet of Things (IoT).
David Braue |
31 Aug |
Read more
Even as one-time Internet giant Yahoo is swallowed in a $6.5 billion acquisition, merger and acquisitions (M&A) experts have warned that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance and could threaten the merger and acquisition activities.
David Braue |
01 Aug |
Read more
Victoria’s Commissioner for Privacy and Data Protection, David Watts has issued the Victorian
Protective Data Security Standards (VPDSS).
Rohan Pearce |
27 Jul |
Read more
If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.
George V. Hulme |
04 Apr |
Read more
Security vendors are showing new confidence against malware attackers as they launch new classes of products designed to take the fight back to malware authors that have recently been overwhelming many companies' traditional defences.
David Braue |
03 Nov |
Read more
One or more salaried ethical hackers will be brought onboard to manage the security exposure of the software output of the government's Digital Transformation Office (DTO), which recently announced the job opening as part of a recruitment campaign to kick-start its work in pushing Australian government agencies online.
David Braue |
09 Sep |
Read more
Australia’s privacy commissioner has urged web site and app developers to make their privacy messages more child-friendly.
Andrew Colley |
04 Sep |
Read more
The federal government should hold off on classifying crypto currencies such as Bitcoin as financial products, a parliamentary committee has recommended.
Andrew Colley |
11 Aug |
Read more
New security patching techniques in Microsoft's just-released Windows 10 may prove particularly useful to Australian PC users, who are less likely to have applied security updates to their operating systems and applications than their neighbours across the Tasman, new figures from vulnerability intelligence firm Secunia have revealed.
David Braue |
31 Jul |
Read more
Tongues were wagging all week about the hack of infidelity-facilitating site Ashley Madison, whose customer database and profiles were stolen and threatened with release by hackers who were angry with the company's ineffective account-deletion policies. The hack looked set to demolish the company's dreams of a London IPO.
David Braue |
27 Jul |
Read more
Australian targets are being hit by far more distributed denial of service (DDoS) attacks of more than 1Gbps than other regional countries and the average severity of attacks jumped by 46 percent in the second quarter of this year, according to new figures from Arbor Networks.
David Braue |
23 Jul |
Read more
Malware researchers reckon the Hacking Team leak has given criminals a “weaponised” toolset that could be used to hack half a billion Android users.
Liam Tung |
23 Jul |
Read more
Non-IT executives are rapidly becoming more aware and supportive of the need for effective IT security and Asia-Pacific companies are leading the world in this trend, according to new figures from research group Gartner.
David Braue |
21 Jul |
Read more
Google has weighed in against a US proposal to regulate the export of intrusion software, arguing that it will harm research into new software vulnerabilities that help it protect users.
Liam Tung |
21 Jul |
Read more
Google says users of its Chrome browser will soon see more full page red warnings about unwanted software than they’ve ever seen before.
Liam Tung |
17 Jul |
Read more
Australian ICT security specialists are earning less than ICT sales professionals, network specialists, telecommunications engineers, and other skilled ICT professionals, a new Australian Computer Society (ACS) analysis has found.
David Braue |
09 Jul |
Read more
The federal government wants private and public agencies to share more information about cyber threats in a bid to harden Australia’s online defenses.
Andrew Colley |
09 Jul |
Read more