Category: Featured

Are security vendors leaving your business at risk?

Are security vendors leaving your business at risk?

An issue that I’ve been mulling over for some time relates to the fundamental nature of customer security engagements, especially concerning product vendors and their place as trusted advisors. This issue led me to a couple of conclusions. Firstly, there is a mismatch between what’s best for the client and what’s best for the vendor. […]

Fighting technology with technology: protecting children from cyber bullies

Fighting technology with technology: protecting children from cyber bullies

Technology has altered the way we live. This goes for both positive interactions with technology, such as keeping in touch with family overseas, as well as the negative aspects, such as cyber bullying, cyber stalking and cyber terrorism. Cyber bullying is no different to traditional bullying, aside from it leveraging technology. Cyber bullies use of […]

How has information technology become the latest security threat?

How has information technology become the latest security threat?

Everyday there are security stories which involve information technology (IT). This article provides three explanations for how we have been taken by surprise by the IT revolution: the IT revolution is a “black swan event”, the IT developers were too optimistic and too trusting, and government is being overwhelmed by the IT revolution. The bottom […]

The non-IT expert’s guide to surviving a cyberattack

The non-IT expert’s guide to surviving a cyberattack

Cyber-crime is one of the fastest growing industries in the world. In the last year, it is estimated that cyber-crime costs business over $400 billion, including reputational damage, costs to remediate breaches and interruption to normal business operations . There is no doubt that the real figures are higher due to under reporting and it […]

How will Australia keep up

How will Australia keep up

The UK’s National Crime Agency (NCA) has recently published its Cyber Crime Assessment 20161, highlighting the enormous amount of cyber-attacks targeting the UK. Unsurprisingly, the report says, “A cyber attack that poses an existential threat to one or more major UK businesses is a realistic possibility.” Over the past twelve months, over 2.46 million incidents […]

Malaysia: SECURITY AND RISK ENVIRONMENT

Malaysia: SECURITY AND RISK ENVIRONMENT

Understanding the Security spectrum of Malaysia, it’s worthwhile to run through a bit of the Malaysian geo-political situation & location and the typicality of the South East Asia region with which Malaysia shares boundaries with a few other countries. Malaysia’s location makes it less susceptible to earthquakes and tsunamis than other countries in Southeast Asia. […]

The safe city and it’s need for interoperability

The safe city and it’s need for interoperability

Most people today who live in cities, particularly large ones, have become accustomed to a relatively high level of general and public surveillance, whether it is the police patrolling the streets, cameras in shopping malls or intelligent security solutions deployed in public transportation systems. Many feel that as long as these systems benefit them as […]

7 Ugly truths about compliance: A primer for new chief compliance officers

7 Ugly truths about compliance: A primer for new chief compliance officers

Many compliance officers live in hope that if they ramp up their persuasive skills, engage employees with spectacular training presentations, and provide succinct and prompt advice, they will receive the respect and recognition that they deserve. Unfortunately, despite all best efforts, compliance officers will struggle to be heard. For those that have just received the […]

Insider threat can be eliminated with a proactive approach

Insider threat can be eliminated with a proactive approach

The media would lead us to believe that the greatest threats faced in today’s digital business world are that of ransomware and ID theft. While they may be right, there is an equally damaging malady lurking right under our noses that is often overlooked – insider threat. This article identifies what insider threats are and […]

The 2016 Security Awards Ceremony & Dinner - Martin Gill Briefings

The 2016 Security Awards Ceremony & Dinner – Martin Gill Briefings

Who should attend? Security Managers Chief Security Officers Suppliers of Physical Security Products and Services If you’re going to be in town on 20 October 2016, please join us for the 2016 Security Awards Ceremony & Dinner at The Westin, Sydney. A security strategy for adding value Retail security: Current trends and future threats Organised […]