Category: Editors Desk

China/Aus CyberSec agreement "tacit acknowledgement" of theft levels; could make Australian firms less safe

China/Aus CyberSec agreement “tacit acknowledgement” of theft levels; could make Australian firms less safe

Here is a statement from Tim Wellsmore, the Director of Threat Intelligence, Asia Pacific at FireEye on the recently announced pact between Australia and China to enhance cybersecurity cooperation: This China-Australia agreement is good news for Australia, but not because it stops China from hacking to steal intellectual property. It’s good news because it’s a […]

From law to cyber security

From law to cyber security

With Rachael Falk – Director of Technology, Security & Strategy at .au Domain Administration Ltd Rachael practiced as a lawyer in Australian and overseas law firms before commencing with Telstra. Moving from legal to cyber security, Rachael had several roles in Telstra Security Operations, including National Security Advisor. Now in a new executive position, Rachael has […]

The Chinese New Year heist

The Chinese New Year heist

A traditional Chinese New Year celebration with volumes of ‘prosperity and good luck’ money gifts, asynchronous working days across 2 time zones, procedural and regulatory vulnerabilities, straight-through automated processing – these were among the elements that contributed to delays in detecting and responding to the Bangladesh Central Bank cyber break-in, and allowed sophisticated well-organized criminals […]

Russia's Cyber War: Options before the US

Russia’s Cyber War: Options before the US

US intelligence’s findings holding Russian President Vladimir Putin directly responsible for a cyber campaign that ensured Republican Donald Trump’s victory in the 2016 presidential election betrays Washington’s weakness as much as Moscow’s deceit. After initially discounting Russia’s manipulation, President-elect Trump accepted the findings and spoke of possible action in response, his incoming chief of staff […]

About pixel densities and what they mean

About pixel densities and what they mean

An IP surveillance system may be used to observe and protect people, objects and people’s activity inside and outside the objects, traffic and vehicles, money handling in banks, or games in casino environment. All of these objects of interest may have different clarity when displayed on a workstation screen. The image clarity depends primarily on […]

Nothing’s Certain, Except Death and Taxes…and Phishing

Nothing’s Certain, Except Death and Taxes…and Phishing

“…But in this world, nothing can be said to be certain, except death and taxes.” – Benjamin Franklin We should add phishing to this idiom, too. Many businesses and their employees have recently fallen victim to a very successful spear-phishing attack that dupes an unsuspecting employee into sending the company’s W-2s to a company executive, who […]

What it takes to be a 'Smart City'

What it takes to be a ‘Smart City’

It may come at no surprise that this year Singapore was named Global Smart City. The city is a metropolitan marvel that supports 5.4 million inhabitants, within a concrete and actual jungle, and even boasts a reservoir within the CBD; one that incredibly supplies 10% of Singapore’s water needs. Singapore was listed ahead of Barcelona, […]

Anti fraud and corruption: More of cultivating a culture than prevention & control

Anti fraud and corruption: More of cultivating a culture than prevention & control

In today’s world, Fraud is a real serious problem for all organizations to come to grip with, given the fact that regardless of the line of business, employees (and non-employees also) commit fraud. Technology changes that occur so rapidly have had a cascading effect on Organisations to adapt to the dynamism of this fast paced […]

Operational security management structure for inimical environments

Operational security management structure for inimical environments

Papua New Guinea (PNG) is an enigma for most companies wishing to set-up and function safely and securely in the country. Anecdotal evidence is rife, as are the newspaper reports, on all aspects of the impact of crime in PNG. Reports related to urban crime point to the underlying reasons including high levels of poverty, […]

Patching the Gap within Manufacturers

Patching the Gap within Manufacturers

“Many people are saying the discovery of a security vulnerability within a dishwasher is yet another example of consumer security not being properly protected. But it should come as no surprise. Manufacturers around the globe are competing to build the latest innovations into their products, including making them ‘smart’ devices. The rise of the IoT […]