17 Mar | View galleries
17 Mar | View galleries
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
22 Sep | View galleries
Australia is the place to be for information security who want the highest salary.
This is what Dr Seuss said and it’s something former Telstra CISO discussed during his opening keynote address at the Emerging Cyber Threats summit held in Sydney on 7 and 8 June 2017.
Last week was all about WannaCry, the ransomware that piggybacked on a Windows exploit that had originally been developed by the US National Security Agency and was exposed to the world during the recent WikiLeaks hacking dump.
The increasing complexity of security environments has pushed many CISOs to the point where only 1 in 5 believes their company is “highly effective” at preventing security breaches – and with the security skills crisis set to continue long-term, recent figures suggest, a growing number will be turning to security automation to compensate.
Governments and corporations alike must escalate the treatment of cybersecurity to the point where it is handled with the same severity as any other risk, speakers at this month’s Cisco Live! conference agreed as security and IT administrators gathered to weigh the progress of cybersecurity policy and technology.
Cyber security has transformed from what most viewed as an IT issue to a central business concern, and the CIO and CISO roles are shifting in response. If we’re to keep up the pace and adopt emerging technologies, security needs to be a priority and CIOs and CISOs need to work together to mitigate risk in organizations across industries and throughout government.
What we are seeing across the region is that it is not one specific country being "hacked" more than another - but what we are seeing that the cyber criminals are looking for general weaknesses in our environment.
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
Everyday can be a D-Day for me and I love to celebrate success, no matter how small it is!
To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.