The AusCERT 2013 security conference, which coincides with the government-sponsored National Cyber Security Awareness Week (NCSAW), dominated the news during the week, and the CSO Australia team was there in full force to hear the latest from industry experts from across Australia around the world.
Mozilla Persona had one of its first conference Australian outings at AusCERT 2013, with software engineer on the project, New Zealand-based Francois Marier's tutorial on the architecture of the identity project.
The Labor government’s $1.46b commitment to boosting cybersecurity efforts was a significant investment in an area where the ‘good guys’ have often seemed hopelessly outgunned.
Workers have been agitating for bring-your-own-device (BYOD) strategies for some time now, but a new survey suggests many are actually concerned that BYOD – which has already raised security issues and is forcing companies to invest in sophisticated analytics – is giving management an excuse to snoop on their information.
Banks wear the cost of online banking fraud against consumers, but do not for businesses which are often not told how it occurred or under what conditions reimbursements are given, says European Union security advisor, Marnix Dekker.
Destroying data to protect against fraud.
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Symantec Vision 2011 Sydney in pictures
The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.
So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.
Sign up now »
The Access Risk Management Suite enables organizations in industries across the board, to improve security, corporate and regulatory compliance and increase operational efficiency.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.