Data breaches have come to be expected. With Australia’s new mandatory data breach notification laws now in place, the Office of the Australian Information Commissioner (OAIC) was informed of 63 breaches occurring within the first six weeks of operation.
Mark McClain |
25 May |
Like deer caught in the headlights, many Australian organisations are likely to be somewhat startled or confused by the new mandatory data breach laws coming into effect in just a few weeks
Barry Brailey |
05 Feb |
Companies of all industries and sizes are in the midst of a revolution, driven by connected customers who expect personalised and consistent experiences across every channel.
Corinne Sklar |
20 Dec |
Much of the world has gone mobile with smartphones and tablets. To a certain extent, the mobile devices have outrun the software to support them.
Peter McBryde |
19 Dec |
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara |
11 Oct |
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings |
10 Oct |
A company’s executives inevitably undertake a number of important leadership activities, making them both visible and accessible.
Darran Rolls |
20 Sep |
It’s that time of the year again. Some of us have returned to work from the school holidays while others are enjoying summer in the northern hemisphere
Radha Krishnan |
20 Jul |
Security leaders need to celebrate success with a better definition of winning
Michael Santarcangelo |
10 Jul |
For many SMEs, cyber insurance falls into the category of “it will never apply to me, so I probably don’t need it.”
Richard Laycock |
02 Jun |
Virtual private networks are a ubiquitous tool in the business world, yet most organisations have no clear idea of their associated costs
Sean Kopelke |
22 May |
Every year seems to be ‘the year of something’ in cyber security.
Kane Lightowler |
01 Mar |
The security threat landscape has changed dramatically in ways unfathomable from just a few years ago. In today’s digital world where applications range in the millions, organizations need to be aware of the fact that enterprise infrastructure is not the only vulnerable spot for hackers.
Martyn Young |
27 Apr |
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
Nick Race |
12 Apr |
The 2014 Asia-Pacific Spatial Excellence Awards (APSEA) have recognised some of the most innovative new products and technologies in the market, with augmented reality application Augview taking out the Innovation and Commercialisation Award.
12 Mar |
DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.
Nick Race |
09 Mar |
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner |
20 Feb |
There’s been a lot of coverage recently around Sony Pictures and the hack attack which has placed Sony in the headlines for all the wrong reasons, with high volumes of sensitive company data stolen and posted online.
David Baker |
22 Dec |
Over the months, the leaked NSA documents have provided enough evidence to confirm that the
government agency knows no limits when it comes to snooping and has a complete disregard for
Jessica Carol |
28 Jan |
Bring your own device (BYOD) will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organisation. We already know that these devices include tablets, including iOS and Android smartphones, “Wintel” laptops, but there are many devices we are yet to see.
Terry Steer |
19 Jul |