Marketing

A prominent place at the table for rural technological advancements

When the general public thinks about today’s exciting technological breakthroughs, the imagery that springs to mind is unlikely to be a crowded pigpen in China or yam fields in the farmland of Nigeria. Yet, rural areas are the front lines for some of the most important gains technology is enabling in modern society. The growing […]

Marketing

Two Linux bugs let remote attackers knock out network devices with low-traffic attacks

Linux distributions have flagged patches for two bugs in the Linux kernel that could allow remote attackers to trigger a denial of service (DoS) on machine.  Ubuntu, RedHat and other maintainers of Linux operating systems are releasing patches for the the bugs. One is called “FragmentSmack” since the DoS can be triggered by the way […]

Marketing

Foreshadow is a new speculative execution exploit targeting Intel’s SGX on Core chips

Credit: Intel Move over, Meltdown and Spectre. A new “Foreshadow” attack, alternatively called L1 Terminal Fault or L1TF, targets Intel’s Security Guard Extensions (SGX) within its Core chips. You should be safe, though, if you’ve already patched your PC as part of the earlier Spectre and Meltdown mitigations that rolled out over the course of […]

Marketing

Cautious optimism greets government’s encryption-interception plans

The industry has responded with cautious optimism in the wake of the federal government’s long-awaited publication of its plan to enable law-enforcement agencies to intercept the encrypted communications of the people they are investigating. A newly-released exposure draft of the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 – also called the ‘Encryption […]

Marketing

The first rule of data-breach response? Don’t panic

With few companies actually doing regular data-breach rehearsals, many CISOs will be at a loss as to exactly how to kick off a response after they detect a data breach. The key, according to IOOF Holdings head of cybersecurity Ashutosh Kapsé, is to not panic – and then to begin analysing the situation with the […]

Marketing

Week in security: Security means anticipating the unknown unknowns

Humans continue to prove remarkably adept at throwing spanners into the cybersecurity works and any CISO must prepare for the ‘unknown unknowns’ those humans can cause, Telstra’s head of cybersecurity told a packed CSO-Kaspersky Lab event this month. Good news: information-security specialists in Australia are earning more than anywhere else in the world according to […]

Marketing

Technology in Government – Stop The Bots!

Australia’s Minister for Law Enforcement and Cybersecurity Angus Taylor kicked off this year’s Technology in Government event with a look at how the country is faring when it comes to protecting our digital assets.  Taylor said the criminal and national security threats we face today are increasingly characterised by global networks, sophisticated organisation and adept […]

Marketing

Humans will surprise you every time: Telstra head of cyber security

The workers in Telstra’s mailroom knew something was strange when the room was clogged with workers asking for the packages they had been sent. There were no packages waiting for the employees, who had received a phishing email encouraging them to click to track an incoming package. The message did not say that it was […]

Marketing

Smarter Security – Is It Time for a New Approach to API Protection

Digital disruption has resulted in the creation of a myriad of new business models and partnership ecosystems, in an era where collaboration and integration are no longer just nice-to-haves; they’re the currency of competitive advantage. An explosion in the use of application programming interfaces (APIs) has underpinned much of this transformation. Programmable Web, the de […]

Marketing

CSO Roadshow Melbourne 2018

CSO Webinar: Plugging the gap in your IAM stack – Expert Guidance for Password Management No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of […]