Category: Editors Desk

North Korean missile launch – IHS Markit analysis

North Korean missile launch – IHS Markit analysis

Alison Evans, deputy head of Asia-Pacific Country Risk, IHS Markit Key points: The missile launched on 28 November was described by North Korean state news agency KCNA as a “new” type – the Hwasong-15[1]. The missile appears to be a modified version of the Hwasong-14 (KN-20) inter-continental ballistic missile (ICBM) launched in July, although the […]

Cyber security skills : Hiring to train

Cyber security skills : Hiring to train

Interview with Chris Thomas, RSA Advisory Systems Engineer, who leads the threat detection and response team, and Rui Ataide, Principal Consultant, Incident Response. Thomas: “Industry needs to look at the opportunity to build people as opposed to hiring a senior 10 year veteran. Someone that has the right aptitude and the right attitude. Building these […]

Overpromised or underdelivered?

Overpromised or underdelivered?

Evaluating the Performance of Australia’s National Cyber Security Strategy This article compares the Australian Government’s own assessment of its progress towards implementing the National Cyber Security Strategy with the Australian Strategic Policy Institute’s (ASPI) evaluation of the same progress. Published in April 2016, the Strategy provided a plan of 33 actions the Government would take […]

Protecting crowded places from terrorism: Developing a public-private partnership approach

Protecting crowded places from terrorism: Developing a public-private partnership approach

Anthony Bergin and Jason Brown run the rule over Australia’s new strategy for protecting crowded places from terrorism. Following the recent Council of Australian Governments (COAG) special meeting on counter-terrorism most discussion focused on the announcement of national facial biometric matching capability. However, little attention was given to the fact that all states and territories welcomed […]

COAG Outcomes - Sharing biometric data of Australians

COAG Outcomes – Sharing biometric data of Australians

In an age where cross jurisdictional cooperation is high on the agenda, it was not surprising that COAG’s data sharing announcement stole the spotlight. The state’s commitment to share the biometric data of most Australians was announced at the special COAG on national security held in Canberra on 5 October. At this meeting, state leaders […]

Putting Security, Growth and Network back into the Security debate

Putting Security, Growth and Network back into the Security debate

“Xi has crafted a unique diplomatic strategy and style for his country, which serves to not only promote the great rejuvenation of the Chinese nation, but also to move forward towards the creation of a shared future for mankind.” – Keith Bennett, vice chairman of Britain’s 48 Group Club. As 2017 draws to a close, […]

Cyber data protection and security in Formula 1

Cyber data protection and security in Formula 1

The Singapore GP, which took place from 14th Sept to 17th Sept, on a floodlit street circuit against a backdrop of historic landmarks and glittering modern skyscrapers, is also famed for its off-track action. Memorable headline acts such as Bon Jovi, Lady GaGa, Shikira had entertained the Padang crowd in the past, and highlights this […]

Global Port Security Spend Boosted by Port Upgrades and New Terminal Developments

Global Port Security Spend Boosted by Port Upgrades and New Terminal Developments

Technology deployment driven by persistent threats, finds Frost & Sullivan’s Security team With 90 per cent of global trade being carried out by the shipping industry, port security is of paramount importance. As vessel traffic continues to increase, the infrastructure will need to be developed. While a number of ports are in the process of […]

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Summary: NIST guidelines on approved public key key-establishments schemes are specified in the NIST SP 800-56 series of publications. While legacy key establishment schemes have been programmatically allowed for use by agencies in FIPS 140-validated modules, NIST SP 800-131A Rev. 1, Transitioning the Use of Cryptographic Algorithms and Key Lengths, specifies that only schemes specified […]

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism risk insurance, whether through traditional or stand-alone policies, is an increasingly important element of domestic corporate insurance programs, according to a new RIMS Professional Report titled, Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders. Authored for RIMS by Micah Skidmore of Haynes and Boone, LLP, the report provides corporate risk […]