State-Backed Espionage Targets Next Gen Tech
In the coming years, nation states’ intelligence services will combine forces with commercial organizations to launch a new wave of industrial espionage.
Steve Durbin | 17 Jun | Read more
In the coming years, nation states’ intelligence services will combine forces with commercial organizations to launch a new wave of industrial espionage.
Steve Durbin | 17 Jun | Read more
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Steve Durbin | 30 Apr | Read more
Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information and cyber security risk.
Steve Durbin | 04 Feb | Read more
As the cyber threat landscape continues to grow more varied and intense in sophistication and strategic intent, demands on information security teams relentlessly shift and swell.
Steve Durbin | 21 Nov | Read more
It’s human nature to pinpoint our focus on the most dramatic threats to our safety, ignoring the more probable hazards. It works the same way for cybersecurity as it does in our personal calculus of shark attacks vs. everyday clumsiness.
Steve Durbin | 25 Jun | Read more
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Steve Durbin | 23 Jan | Read more
Most high-profile attacks on corporate data centres and institutional networks have originated outside of the victimised organisations – in many cases from halfway around the world.
Steve Durbin | 06 Jul | Read more
Cyber security was all over the headlines in 2016 with frequent high-profile data breaches taking place at major, global organizations. In the coming year, cyber-attacks will continue to become more advanced and sophisticated.
Steve Durbin | 16 Jan | Read more
Cyber-attacks continue to become more advanced and sophisticated than ever before.
Steve Durbin | 11 Oct | Read more
Cyberspace is an increasingly attractive hunting ground for criminals, activists and terrorists motivated to make money, cause disruption or even bring down corporations and governments through online attacks.
Steve Durbin | 11 May | Read more
“There’s an app for that.” Apple’s ubiquitous tagline-turned-punchline is still going strong, 6 years after its debut. As our lives are increasingly driven and enhanced by digital tools of all kinds, the humorous irony resonates: we can’t actually control everything from our smartphones. One of the thorniest issues facing security professionals is a perfect case in point: we can’t rely on technology to keep our technology and data safe from our employees’ bad habits, gullibility, laziness, or malfeasance.
Steve Durbin | 22 Dec | Read more
Long gone are the days when a cyber-intrusion evoked images of pimple-faced teenagers hacking away in their parents’ basements. These days, cybercrime is global and gravely sinister.
Steve Durbin | 10 Jul | Read more
A mere handful of years ago, many of us were jealous of that one friend or coworker who was flashing their new iPhone, a mysterious gadget we couldn’t wait to get our hands on. Fast forward to the present, less than a decade later, it seems everyone you know owns a shiny new ultrathin phablet. Billions of people worldwide use smartphones, tablets, or phablets to run their personal and professional lives. They go with us everywhere, from bedside to kitchen table to workplace. This rapid rise of consumerised mobile technology has upended everything from our most intimate relationships to broader cultural dynamics.
Steve Durbin | 20 May | Read more
Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.
Steve Durbin | 30 Mar | Read more
For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.
Steve Durbin | 13 Jan | Read more