During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Tim Murphy |
24 Apr |
Historically, there’s little love lost between NetOps (network operations) personnel and those in SecOps (security operations).
Mario Vecchio, Big Switch Networks |
12 Apr |
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Manish Bahl |
26 Feb |
Last year saw a new wave of high-profile data breaches that reminded us that no industry is safe.
Ilan Paretsky |
15 Feb |
Today’s factories – be they relatively simple production facilities, or highly complex automation environments – face a dilemma that was unimaginable in earlier times.
Christoffer Karlsson |
01 Feb |
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Steve Durbin |
23 Jan |
Australian businesses have been tested massively this year in terms of cyber security, with an increasing number of high profile businesses in the spotlight for all the wrong reasons.
Graham Pearson |
19 Dec |
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
Jon McGettigan |
30 Oct |
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara |
11 Oct |
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings |
10 Oct |
For many years, IT departments and their infrastructures were managed under a strict command-and-control structure. This situation is now rapidly changing, and CIOs need to change with it.
Sean Kopelke |
26 Sep |
Cybersecurity – and consequently cyber insurance – is something that not many SMEs (small to medium-sized enterprises) spend time thinking about.
Richard Laycock |
10 Sep |
One of the major aspects of ITAM (IT Asset Management) is SAM (Software Asset Management). SAM has seen a huge increase in interest and demand in its services recently.
Savaram Ravindra |
05 Sep |
With business becoming increasingly digital, the deployment of solid IT security has never been more important. Breaches can cause anything from mild inconvenience to widespread disruption and financial lo
Sean Kopelke |
25 Aug |
The frequency of financial crime and the diversity of attack techniques are increasing, forcing enterprises into difficult investment decisions to contain risks and comply with regulations.
Danny Luong |
14 Aug |
Is Australia becoming its own worst enemy when it comes to addressing cybersecurity?
Greg Gale |
04 Aug |
Australian companies more prone to long business interruptions due to ransomware
David Braue |
02 Aug |
Companies spend a lot of time and energy ensuring their IT systems are secured against external cyber attacks. Unfortunately, many don’t realise they also need to consider threats that originate from within.
Chris Smith |
31 Jul |
Cybersecurity has gained a lot of attention in the last couple of years, no thanks to the increasing number of high profile cyberattacks across the globe.
Mark Micallef |
24 Jul |
“This call will be recorded for quality, training and verification purposes” is a familiar phrase heard when seeking assistance from an airline, bank or any type of customer service situation. However, the question that comes to mind is under what circumstances these recorded logs are used?
Richard Cookes |
24 Jul |