Open Letter to Attorney-General Nicola Roxon
An open letter to Roxon from CSO Australia's Jarrod Loidl.
Jarrod Loidl | 31 Oct | Read more
An open letter to Roxon from CSO Australia's Jarrod Loidl.
Jarrod Loidl | 31 Oct | Read more
For as long as I can remember there has been a vicious debate about the speed of deploying security patches and tempering it with patience enough to test them. This mantra was born from a number of historical reasons.
Jarrod Loidl | 22 Jun | Read more
The security industry seems to be broadly polarised by the Attorney-General's recent announcement of the formation of CREST Australia (Council of Registered Ethical Security Testers).
Jarrod Loidl | 22 May | Read more
2011 was an interesting year for information security. Institutions began to make much greater use of the Internet as a mechanism for obtaining and sharing information, including conducting operations against their enemies. Today, we are escalating towards a far darker cold cyber war era, 2012 is going to have a dark side.
Jarrod Loidl | 16 Mar | Read more
In a previous article I introduced the three top causes of security breaches in 2011: SQL Injection, Weak Passwords and Social Engineering Attacks.
Jarrod Loidl | 22 Feb | Read more
Software development is not easy. In fact, I don’t think I’ve ever really seen a job with more conflicting priorities.
Jarrod Loidl | 20 Dec | Read more
It's been an interesting year for those following information security news. We started the year with the Vodafone breach, one of the largest privacy breaches ever experienced within Australia.
Jarrod Loidl | 13 Dec | Read more
Recently I was assigned to an engagement with one of the Principal Consultants. This consultant has a tremendous amount of experience and someone for whom I have great respect.
Jarrod Loidl | 11 Oct | Read more
Every year sees an increase in usage of the Internet. Broadband penetration rises. More websites are created. Business grows by sharing information with their partners. This desire to reach the masses and provide goods and service cheaper and faster than their competitors often means trade-offs are made. These trade-offs typically involve trading accessibility for security.
Jarrod Loidl | 07 Sep | Read more
While the recent attack against RSA has caused many to question the RSA two factor solution, most people have ignored the more practical and more likely threats facing two factor authentication today.
Jarrod Loidl | 14 Jul | Read more