• Hacking humans

    Human factors have always been the bane of security professionals, and social engineering is also high on the list of factors requiring mitigation measures and controls. Yet their very nature makes them highly variable – humans will always work out circumvention to a control if it makes their lives easier.

  • The insanity of security – a series of queries!

    Whether you attribute this quote to Rita Mae Brown, or Albert Einstein, it’s out there and it sums up a lot of security practices: “Insanity: doing the same thing over and over again and expecting different results."

  • Radical or Lazy, what type of info sec practitioner are you?

    Having worked in and around information security for more than 20 years, I think I’m in a good position to make observations about the industry.

  • How much security is too much security?

    Enex TestLab’s various divisions cut across a large number of industry sectors, perhaps more so than most organisations. From my perspective, we deal with an impressive number of organisations and individuals within those industries. Heading this organisation, therefore, requires me to wear a number of different hats in any given day. But the one common denominator is the humans that we need to interact with.

  • Are we losing the battle? Or have we lost the war?

    I get around a lot, and I mean that in the nicest possible way. Over the decades there seems to have been a seismic change in the government and organisational view of operational security and exactly what the function and charter of that role entails.

  • The question of privacy

    It is an interesting construct this theory of privacy. Increasingly, people are becoming aware that the more highly and ubiquitously they become digitally connected to the global economy, the more they are forsaking their personal information. Not just basic information either, but their likes, dislikes, views, opinions and passions. And that information is being aggregated.

  • Big or Little brother?

    It used to be the fear of 1984 and Big Brother—watching and controlling citizens’ every move. These days the writing is on the wall, while Big Brother is watching via the CCTV networks, little brother is insidiously infiltrating our computers and smart devices to build a cache of information—and it is no longer simply making off with corporate/personal data/information. Enter the RAT.

  • Baseline Security Evaluation - SEPR

    Enex TestLab has been providing independent testing services for 24 years now. We cover 90 industry sectors with 8 separate testing divisions.

  • There is a reason why we do what we do, and it starts with a 'P'

    There has to be a certain level of paranoia in the security industry. It’s what we do, our job is to believe nothing and see gaping holes where others simply trust things are being looked after.

  • Data retention, governance and privacy

    There has been a lot of coverage in recent months over the Australian Federal Governments proposition to implement a data retention policy. The debate is polarising and highly emotive, similar to that of the shelved mandatory Internet content filtering policy.

Matt Tett
Matt Tett is the Managing Director of Enex TestLab, an independent testing laboratory with over 22 years history and a heritage stemming from RMIT University. Matt holds the following security certifications in good standing CISSP, CISM, CSEPS and CISA. He is a long standing committee member of the Australian Information Security Association (AISA), Melbourne branch, and is also a member of the Information Systems Audit and Control Association (ISACA). Enex TestLab can be found at http://www.testlab.com.au blog at http://enextestlab.blogspot.com and can be found on twitter as @enextestlab.
Blogs
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Security and Data Protection

Protect your computers and data.

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.