Corporate Partners

Opinions News, Features, and Interviews


How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

Security threats through the Cloud

As with most of technology, security goes through periodic changes, cycles and generations. Hardware, software, applications and methodologies all mature, become commoditised and standardised to the point of being invisible, and then are reinvented in a new evolved form. New platforms and new devices create new opportunities but are also subject to new evolved threats – something that remains true of security.

Gordon Makryllos | 24 Sep | Read more

More Opinions news


Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

More Opinions features



There can sometimes be a fine line between suspicion and guilt. Determining guilt or innocence can require careful examination of all available evidence, as in the film Strangers on a Train. While Bruno kills Guy’s wife Miriam, Guy commits no crime, yet the police arrest Guy as he has motive to kill his wife. This situation shows that motive is not enough: a system based on accuracy and thorough analysis of all evidence will lead to the true malicious actor.

Dr Claudia Johnson | 03 Aug | Read more

How to hack a drone

This week the founder of Amazon- Jeff Bezos, has announced that the planning process for Amazon Prime Air is moving forward. Some speculate that this could be an elaborate PR stunt, with the amount of background and information available on the project. I am inclined to believe the plan, especially with the FAA (Federal Aviation Administration) beginning to relax laws on flying UAS (Unmanned Aircraft Systems) at designated altitudes, with no penalties or crazy regulation.

Thomas Booth | 31 Jul | Read more

The Nine Traits of Next Generation Authentication and Authorisation

Historical forms of authentication were never meant for the networked landscape we live in today. The first passwords were adequate authentication solutions only because the systems they secured were isolated. Unfortunately, the isolated systems that pervaded the early days of the computer revolution have set the foundation for authentication in the Internet Age.

Geoff Sanders | 29 Jul | Read more

How to Stop Stegoloader and Other Types of Digital Steganography Malware

Back in 440 BCE, a Spartan king named Demaratus secretly warned an ally of an imminent attack by writing a message on the wooden back of a wax tablet, and then applying a beeswax surface to hide it. Not only did this clever move help thwart the attack, but it’s an early example of what would later be called steganography: the practice of concealing a message within another message. Well, fast forward about two and a half millennia -- and swap a world full of wax tablets to one full of digital tablets -- and cyber criminals have borrowed a tactic from the Ancient Spartan Royalty playbook by unleashing Stegoloader: a nasty new malware that hides within a PNG image file, so that it can covertly infect endpoints and raid businesses of their confidential data.

Israel Levy | 24 Jul | Read more

More Opinions opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place