Category: Editors Desk

NetEvents Global Summit - Silicon Valley, USA

NetEvents Global Summit – Silicon Valley, USA

In late September APSM spent a week visiting San Francisco, San Jose and Silicon Valley, courtesy of NetEvents and attending the ‘Innovators in Cloud, IoT, AI & Security’ program at the Dolce Hayes Mansion, San Jose. During the three days we were driven through Silicon Valley, briefed on a range of new and emerging technologies, […]

The smartest tool in the cybersecurity toolbox: ARTIFICIAL INTELLIGENCE

The smartest tool in the cybersecurity toolbox: ARTIFICIAL INTELLIGENCE

Humans can’t keep up. Humans can’t effectively handle the flood of malware attacks, zero-day exploits, phishing, patches, updates, weak passwords, ransomware, distributed denial-of-service (DDoS) and insider incidents that occur on enterprise networks. There’s too much data to absorb, and the patterns that might indicate a vulnerability or attack are too subtle. Artificial intelligence (AI) to […]

2017 Defence Year in Review: Chinese military developments and Russian geopolitical posturing

2017 Defence Year in Review: Chinese military developments and Russian geopolitical posturing

Peter Felstead, editor, Jane’s Defence Weekly by IHS Markit While 2017 may draw to a close with the Islamic State all but successfully defeated in Iraq and Syria — restoring some semblance of order to the early 21st century geopolitical paradigm — when the year is reviewed through a more traditional ‘Cold War lens’ the […]

The premise of personal risk management skills: Why we should start with the fundamentals

The premise of personal risk management skills: Why we should start with the fundamentals

The complexities and threats of our fast paced and modern world have never been more diverse or challenging than they are now, ranging from ever evolving cybercrime, modern day terrorism to old fashioned violent assault and petty crime. In addition, the fast-paced world, and the way we live brings levels of stress and pressure that […]

Hackers are humans: let’s beat them with soldiers

Hackers are humans: let’s beat them with soldiers

In terms of the security of our information systems, it is my opinion that western materialism is contributing to Australia’s growing cyber risk. We are increasingly viewing our information systems as an entity that can be defended with a one stop shop of cyber security products. This type of thinking is leaving our economy and […]

Spy spotting : What careless mistakes reveal about cyberespionage in APAC

Spy spotting : What careless mistakes reveal about cyberespionage in APAC

Errors and small clues left behind by attackers are vital in attribution, providing valuable intelligence on the people behind a cyberespionage attack and the possible connections between them. Kaspersky Lab’s researchers have been tracking advanced cyberespionage operations originating in and targeting Asia Pacific countries for the last 10 years, and have undertaken a review of […]

Future of cyber ‘quantum’security: Can’t copy, can’t intercept

Future of cyber ‘quantum’security: Can’t copy, can’t intercept

DR JACQ ROMERO, L’Oréal-UNESCO’s 2017 Australian Fellow for Women in Science For over ten years the L’Oréal-UNESCO For Women in Science program has supported Australian female scientists with the aim of ensuring that women are fairly represented at all levels in science. The program looks to encourage more young women to enter the profession and […]

The future of apps in a multicloud world: F5 agility 2017

The future of apps in a multicloud world: F5 agility 2017

Cloud, mobility, and the Internet of Things continue to elevate Apps to the core of business plans. As organisations undergo digital transformation, optimising applications for actionable intelligence and generating a business return remains a challenge. A multi- Cloud strategy is seen as the key to minimising the risks of ‘keeping all eggs in one basket’, […]

ASD Case Study highlights serious gaps in cybersecurity by defence contractors

ASD Case Study highlights serious gaps in cybersecurity by defence contractors

In November 2016, tipped off by a ‘partner organisation’ advising that an ‘APT actor’ had gained administration access to a fourth-tier defence contractor, ASD and CERT Australia were rapid to respond and on site the following day. Though on arrival, without official ASD credentials, the ‘customer’, a small aerospace engineering firm, with about 50 employees, […]

Cyber defense in depth: high walls alone won’t defend the castle

Cyber defense in depth: high walls alone won’t defend the castle

By Mike stone For business and government, cyber security is the new arms race. We defend, and the enemy counters. We respond, and so do they. The cycle escalates in perpetuity. A strong cyber defense is an integral part of good IT operations. Operate and defend are effectively two sides of the same coin and […]