The physical security world has been in the midst of a significant change over recent years. Old security cameras, that could be connected with a coaxial cable and some power, are giving way to IP enabled devices. This has lead to a complete rethink on how security systems are designed, deployed, operated and maintained.
There's not a company worth its salt that hasn’t, at least, given some consideration to crisis planning. Most of our crisis planning is based upon basic risk management strategies. Come up with a bunch of potential scenarios, apply some analysis to get a handle on likelihood and impact, and then come up with mitigation and management strategies.
Will it be the total surveillance society and internet licenses? A breakdown of authority, with e-militias fighting extreme anarcho-hactivists? Or one of the other two?
Even the most security diligent organisations are realising that breaches are no longer a question of ‘if’ but a question of ‘when.’ Yet many organisations still do not factor the inevitability of compromises into their overall defense strategy, instead focusing on controls to keep every conceivable type of threat at bay. However, the ability to use controls to close every gap attackers can find and reduce the surface area of attack to zero is fundamentally flawed.
The surge in mobile computing and BYOD (bring your own device) initiatives is translating to higher productivity and job satisfaction for your workforce—but it’s also creating alluring new opportunities for cybercriminals.
A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.
As security threats have evolved over the past 10 years, online retailers have been under increasing pressure to protect digital properties without impacting performance levels, all on a budget.
At a time when targeted attacks continue to be the methodology of choice by cyber criminals, Sanjay Mehta, managing director at Trend Micro Australia and New Zealand, discusses how Australian businesses should look beyond standard industry security products and solutions to build custom defence strategies unique to their organisation. He outlines the best way for companies to individually detect, analyse, adapt, and respond to targeted attacks.
Enterprises and online businesses face mounting challenges as the use of secure web based content and applications continue to grow. Easy-to-access, highly mobile, and social are the new user mantras of today’s IT.
Devices are getting smarter, faster and increasingly cognitive. All around us we see the continuing rapid evolution of electronic devices, both mobile and fixed, into the next generation of tools that will help us live our lives differently.
SINTEF (Norwegian: Stiftelsen for industriell og teknisk forskning), headquartered in Trondheim, Norway, is the largest independent research organisation in Scandinavian states that found a full 90 per cent of all the data in the world has been generated over the last two years. This is attributed to the rise of social media and cloud computing. IBM further quantified this by stating that we create 2.5 quintillion bytes of data – so much that 90 per cent of the data in the world today has been created in the last two years alone.
Sign up now »
Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.