Category: Featured

Cyber defense in depth: high walls alone won’t defend the castle

Cyber defense in depth: high walls alone won’t defend the castle

By Mike stone For business and government, cyber security is the new arms race. We defend, and the enemy counters. We respond, and so do they. The cycle escalates in perpetuity. A strong cyber defense is an integral part of good IT operations. Operate and defend are effectively two sides of the same coin and […]

Cyber security skills : Hiring to train

Cyber security skills : Hiring to train

Interview with Chris Thomas, RSA Advisory Systems Engineer, who leads the threat detection and response team, and Rui Ataide, Principal Consultant, Incident Response. Thomas: “Industry needs to look at the opportunity to build people as opposed to hiring a senior 10 year veteran. Someone that has the right aptitude and the right attitude. Building these […]

Overpromised or underdelivered?

Overpromised or underdelivered?

Evaluating the Performance of Australia’s National Cyber Security Strategy This article compares the Australian Government’s own assessment of its progress towards implementing the National Cyber Security Strategy with the Australian Strategic Policy Institute’s (ASPI) evaluation of the same progress. Published in April 2016, the Strategy provided a plan of 33 actions the Government would take […]

Protecting crowded places from terrorism: Developing a public-private partnership approach

Protecting crowded places from terrorism: Developing a public-private partnership approach

Anthony Bergin and Jason Brown run the rule over Australia’s new strategy for protecting crowded places from terrorism. Following the recent Council of Australian Governments (COAG) special meeting on counter-terrorism most discussion focused on the announcement of national facial biometric matching capability. However, little attention was given to the fact that all states and territories welcomed […]

COAG Outcomes - Sharing biometric data of Australians

COAG Outcomes – Sharing biometric data of Australians

In an age where cross jurisdictional cooperation is high on the agenda, it was not surprising that COAG’s data sharing announcement stole the spotlight. The state’s commitment to share the biometric data of most Australians was announced at the special COAG on national security held in Canberra on 5 October. At this meeting, state leaders […]

Putting Security, Growth and Network back into the Security debate

Putting Security, Growth and Network back into the Security debate

“Xi has crafted a unique diplomatic strategy and style for his country, which serves to not only promote the great rejuvenation of the Chinese nation, but also to move forward towards the creation of a shared future for mankind.” – Keith Bennett, vice chairman of Britain’s 48 Group Club. As 2017 draws to a close, […]

Cyber data protection and security in Formula 1

Cyber data protection and security in Formula 1

The Singapore GP, which took place from 14th Sept to 17th Sept, on a floodlit street circuit against a backdrop of historic landmarks and glittering modern skyscrapers, is also famed for its off-track action. Memorable headline acts such as Bon Jovi, Lady GaGa, Shikira had entertained the Padang crowd in the past, and highlights this […]

Building a modern security operations centre

Building a modern security operations centre

How to protect your organisation’s information Security Information and Event Management (SIEM) technologies are not new, but there remains plenty of misinformation and misunderstanding about how to use them. Critics focus on them being little more than log collector and storage tools, that due to their management overhead, gives little in the way of return […]

The ASX 100 Cyber health check report - What’s next for your board?

The ASX 100 Cyber health check report – What’s next for your board?

The Australian Stock Exchange (ASX) and Australian Securities and Investment Commission (ASIC) along with the “Big 4” accounting firms have released the ASX 100 Cyber Health Check Report ASX Report PDF to establish a baseline in cyber security via a high-level “health check”. I commend the ASX and ASIC and the other participating companies for […]

Navigating the IT landscape of the future: The cultural shift your business needs

Navigating the IT landscape of the future: The cultural shift your business needs

The future IT landscape is scary for businesses of today, but it is certainly not insurmountable. Naturally, as the value of data to people and organisations grows, ransomware attacks, data theft and extortion will also continue to be on the rise. But the threats are not just perpetrated through stealthy backdoor tactics, in fact, according […]