As a business with 100% of infrastructure on cloud platforms I don’t need to worry about data centres which has enabled us to move quickly into overseas territories. We are very careful when selecting cloud partners as we rely heavily on there security practices to protect our data and IP.
David Gee |
01 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
There is an undeniable shortage of Cyber Security resources in Australia and the short-term answer has to be to bring talent in from other countries.
David Gee |
31 Mar |
Read more
The idea of punishing someone for getting Malware is abhorrent to myself. But if you are a CISO, then you have mobilise your team and address the issue.
David Gee |
31 Mar |
Read more
Cyber security is not as concrete as physical asset risks and often causes businesses to understate a potential outcome.
David Gee |
31 Mar |
Read more
What we are seeing across the region is that it is not one specific country being "hacked" more than another - but what we are seeing that the cyber criminals are looking for general weaknesses in our environment.
David Gee |
31 Mar |
Read more
"It is important for organisations to understand that using the cloud does not mean they have “outsourced” their risks and that someone else is taking care of it."
David Gee |
31 Mar |
Read more
We all have many cyber security tools and the sad truth is that breaches and vulnerabilities still take a long time to be detected and re-mediated. The quoted data is that it takes around 252 days to detect then a further 82+ days to resolve.
David Gee |
30 Mar |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
10 Mar |
Read more
In December 2015, the personal data of 31,150 (mostly past) Optus customers was posted on short-term job website Freelancer.com in what was a major breach of their privacy.
David Gee |
01 Mar |
Read more
A few years ago there was noise about Huawei’s connections with the chinese military. The inference was that you can’t trust them and they may have some direct government ownership or connections.
David Gee |
24 Feb |
Read more
Sun Tze wrote this book of learning many centuries ago. But is appears more relevant in the modern age than we imagine. In one corner with have the Russian Cyber Military Unit, with the Syrian Electronic Army, in the next corner the PLA Unit 61398, North Korean Bureau 121 and Israel Unit 8200.
David Gee |
19 Feb |
Read more
It is a simple question and perhaps not one that has an easy answer. My guess is that it likely to be no, perhaps or they are in learning mode.
David Gee |
15 Feb |
Read more
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
David Gee |
10 Feb |
Read more
It all sounds harmless to post and share information, but to attackers these are great clues and can form the basis of a hack. Social engineering is a technique used as a foundational step to collect information for open sources.
David Gee |
09 Feb |
Read more