Identity & Access News, Features, and Interviews

News

AusCERT 2018 - Finding a monster by its shadow

Sometimes, you can't see the bad guy lurking in your systems. They might have been in, done their damage and disappeared like a thief in the night. But there's always some evidence if you look hard enough and in the right place. This is the world of supply chain, or shadow, attacks.

Anthony Caruana | 08 Jun | Read more

More Identity & Access news

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

The encryption quiz

The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.

Tim Greene and Jim Duffy | 29 Sep | Read more

Security 2011 show hits Sydney: Gallery

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Neerav Bhatt | 25 Aug | Read more

More Identity & Access slideshows

Features

It Wasn’t Me, It Was Bennett Arron

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Bennett Arron | 11 Jul | Read more

More Identity & Access features

Opinions

Do brands benefit by using AI Systems?

Artificial intelligence is becoming one of the most popular topics among brands and marketers. This is because it is proven to make everyone’s life easier. Brands have chunks of data they need to process and make the best out of them, and AI proved to be very helpful with such tasks.

Karthik Reddy | 02 Jun | Read more

The evolution of IoT in a threat laden landscape

Australia is in the midst of an IoT revolution. Recent research from the IoT Alliance Australia indicates that IoT technologies will create a potential $120 billion boost to the Australian economy by 2025. What started as a vanity accessory for early adopters and fitness fanatics has turned into the next national tech boom.

David Holmes | 10 May | Read more

More Identity & Access opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release