Retail — Opinions

​The Grubb appeal and our metadata collection laws

Yesterday, the federal court handed down its decision on a thorny and controversial legal dispute between Telstra, the federal privacy commissioner and former technology journalist Ben Grubb over... I was about to write “his” metadata, but I can’t. The court has deemed that it’s not his or even about him.

Andrew Colley | 20 Jan | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

App Security- the great unspoken

There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.

Mav Turner | 20 Feb | Read more

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks

Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.

Anthony Stitt | 18 Feb | Read more

Password Protection: How Far Can Hackers Get?

For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Steve Durbin | 13 Jan | Read more

Sony Attack: an Australian Perspective

The cyber-attack on Sony Pictures Entertainment in late November is not the first time that the Sony Corporation has been a target for cyber-criminals and if anything can be learned from the attacks, it is that corporations are not taking cyber-security seriously.

Mark Gregory, RMIT | 12 Jan | Read more

Editor's Recommendations

Brand Page

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release