The cyber-attack on Sony Pictures Entertainment in late November is not the first time that the Sony Corporation has been a target for cyber-criminals and if anything can be learned from the attacks, it is that corporations are not taking cyber-security seriously.
Mark Gregory, RMIT |
12 Jan |
With over one billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. The opportunity to target such a huge audience and get more bang for the buck is not easily dismissed nor will it be any time soon.
Emmanuel Carabott |
16 Dec |
As we wrap up another busy year in high tech, many IT leaders have cloud technology top of mind. The cloud is profoundly transformative, standing out even in a tech landscape crowded with big ideas and disruptive developments. Despite initial hesitation, cloud adoption has grown rapidly and doesn’t show any signs of slowing.
Paul Lipman |
02 Dec |
Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.
Dr Claudia Johnson |
23 Oct |
Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.
Wana Tun |
03 Oct |
More Strategic Planning / ERM opinons