17 Mar | View galleries
17 Mar | View galleries
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
22 Sep | View galleries
A CISO (Chief Information Security Officer) is the pinnacle of successes and the aim for many a security engineer in the industry but many will never achieve this level of success.
The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
Most Australian CIOs hope to become CEO of their company despite recent survey findings suggesting that just almost no current ASX200 CSOs actually have a background in technology.
Australia is the place to be for information security who want the highest salary.
This is what Dr Seuss said and it’s something former Telstra CISO discussed during his opening keynote address at the Emerging Cyber Threats summit held in Sydney on 7 and 8 June 2017.
Cyber security has transformed from what most viewed as an IT issue to a central business concern, and the CIO and CISO roles are shifting in response. If we’re to keep up the pace and adopt emerging technologies, security needs to be a priority and CIOs and CISOs need to work together to mitigate risk in organizations across industries and throughout government.
What we are seeing across the region is that it is not one specific country being "hacked" more than another - but what we are seeing that the cyber criminals are looking for general weaknesses in our environment.
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
Everyday can be a D-Day for me and I love to celebrate success, no matter how small it is!
To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem