That threat offered little solace to corporate data users that are already struggling with the need to detect breaches more quickly than they are doing – particularly since Australians are overwhelmingly in favour of the new breach-notification laws.
Yet that process is harder than many believe: figures suggest that if you haven’t spotted a breach within 3 hours the chances are that it’s already gone.
Money could be siphoned away from companies even faster than that due to new banking technology that’s set to accelerate the speed at which transfers are cleared.
That’s hardly reassuring to CISOs just trying to keep their data protected – with threats lingering due to everything from Petya and NotPetya to fake Telstra and EnergyAustralia email bills, to ransomware and shoddy smartwatch security.
Some CISOs are turning to the synchronised security approach, while others in the industry are seeking to address developers’ security-skills deficiency: one security startup debuted technology that builds customised security wrappers around software as it’s being rapidly iterated during frequent builds under Agile development processes.
Meanwhile, Google debuted an option for Gmail that boosts security by locking access to the service unless a hardware key is presented.
This, even as some security pundits begin to worry what happens when cybercriminals get their heads around the potential of machine learning to make their attacks more effective than ever.
- The rise of the "on-demand" Chief Information Security Officer
- Microsoft announces ransomware-stopping Windows 10 feature
- Protecting Australia schools from cyber attack
- Cloud migrations motivate boards on security more than compliance or fear of attack
- Does your organisation lack basic “cyber hygiene”?