While preventing ransomware attacks and data theft tend to be top priorities for corporate IT security teams, awareness is increasing of the growing threats posed by cyber warfare.
Security Emerges As A Critical Input To User Experience Decisions
Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX
teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.
Why an Effective Security Strategy Requires Three Pillars
The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats...
AIIA Urges Government To Reconsider Increases In Data Breach Penalties
AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good...
A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.
For The Sake Of Its Cybersecurity, Australia Must Come Together
The pandemic has exacerbated existing security problems As the cybersecurity threatscape continues to become more complex and challenging, the media have...
The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure.
Business cyber risks and the humble home network
Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren’t sure what that exploited means in context, imagine a hacker standing behind you 24×7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data.