Opinions — News

Unconventional crisis planning

There's not a company worth its salt that hasn’t, at least, given some consideration to crisis planning. Most of our crisis planning is based upon basic risk management strategies. Come up with a bunch of potential scenarios, apply some analysis to get a handle on likelihood and impact, and then come up with mitigation and management strategies.

Anthony Caruana | 10 Apr | Read more

Preparing for an Attack: 5 Tips for Organisations

Even the most security diligent organisations are realising that breaches are no longer a question of ‘if’ but a question of ‘when.’ Yet many organisations still do not factor the inevitability of compromises into their overall defense strategy, instead focusing on controls to keep every conceivable type of threat at bay. However, the ability to use controls to close every gap attackers can find and reduce the surface area of attack to zero is fundamentally flawed.

Chris Wood | 14 Aug | Read more

Five Key Challenges Facing CSOs Today

2012 has been a tough year for IT security and the trend seems to be continuing into 2013. We have now become accustomed to groups such as Anonymous that have wreaked havoc on a number of large government and corporate organisations. A new frontier in cyber threats has opened. The driver for cyber intrusion is no longer fame, but theft of intellectual property, financial information, blueprints and other classified information for financial gain.

Ashwin Pal | 10 Jul | Read more

Big data and its security implications

There has been a significant amount of talk about big data lately in the media particularly at the RSA security conference. However, many people are still unclear as to what constitutes big data and furthermore what its implications are to us as security professionals. Within this brief article, I shall try and address both these points.

Ashwin Pal | 08 Mar | Read more

Ransomware – a brief overview

There have been a number of ransomware attacks on Australian businesses lately. Awareness of this threat is increasing, but a number of small businesses, in particular, are still in the dark around what this is and how to protect themselves against it. Within this brief article, I shall try and cover both these points.

Ashwin Pal | 08 Mar | Read more

Part 3 Business Continuity and implementation

By implementing a national multi-factor authentication system Australian citizens will benefit from having the highest levels of online security in the world. This technology may provide a significant competitive advantage to business in securing digital assets and could lead to innovation based export opportunities. The headlines report massive breaches of information that directly expose our financial systems to grave risk. Australia must set the benchmark in secure digital vigilance to safeguard our information security perimeter from existing and potential threats.

Mike Ryan | 11 Sep | Read more

How CIO's meet growing security threats

When it comes to protecting enterprise data, CIOs and CSOs are at a crossroads. The complexity and prevalence of security threats continue to grow, bolstered by consumer IT and mobility. The open nature of IT has paved the way for far more sophisticated attacks—beyond conventional credit card data theft to multilevel attacks. Information security executives face perhaps the toughest challenge of their careers.

CSO staff | 20 Aug | Read more

Part two – Open standards are the key to building a Federated System

Greater adoption and usage of Open standards will lower the costs of MFA. There are a number of open standards in the security market. Reducing the costs to business by using open standards in deploying MFA is a practical forward looking strategy. Provisioning MFA has traditionally been costly. With a limited choice of vendors, the drivers for change have moved very slowly. Because of the high implementation and ownership costs, widespread adoption of the technology has been inhibited.

Mike Ryan | 18 Jun | Read more

CSO: the art of catching the board's ear

The success of a CSO and the enterprise’s security strategy depends on awareness at the C-level of not just the threats, but their implications, making communications and building alliances outside IT the key to a CSO’s success. The battle to secure data has become a more vicious and dynamic beast today, according to Mike Rothman, CEO of analyst firm Securosis, who says attackers, including actors who may have “very deep pockets” that tilt the balance of power in their favour. Add these to the chaos of hacktivists, well-organised cybercriminals, social media and Cloud computing, and the challenges that CSOs face in protecting corporate data become clear.

Liam Tung | 18 Jun | Read more

Embedding risk culture

An observation from the global financial crisis is that organisations with a weak risk culture can experience extensive or even catastrophic damage. Significant investment in risk management people, processes and technology is only part of a sound business risk environment. The key component is the risk culture.

David Roche | 28 Feb | Read more

Crypto researcher Arjen Lenstra shares thoughts on paper blasting RSA cryptosystem

What a week for the RSA cryptosystem! A group of prominent researchers published <a href="http://eprint.iacr.org/2012/064.pdf">a paper</a> blasting it as woefully insecure, <a href="http://www.networkworld.com/news/2012/021612-rsa-crypto-256267.html">RSA said there's nothing wrong with the RSA algorithm</a>, it's an implementation issue mainly with random-number key generation, and now the cryptography researcher behind the paper, Arjen Lenstra, signs off the week with a few thoughts about it all.

Ellen Messmer | 18 Feb | Read more

Data centres need to lift their standards

The ‘cloud’ is has been growing rapidly. Data centres have an increasingly critical role in the supply of effective and efficient cloud-related services, but adoption can be hindered by concerns over data centre security. Having the correct data centre security in place is vital.

Brahman Thiyagalingham | 13 Dec | Read more

The year in review: 2011-2012

2011 has been characterised by highly visible cyber attacks and diversification by cyber criminals to target new platforms, the use of mobile devices for business has come to the fore. 2011 has also seen the UK Government place a heavy focus on the importance of cyber security. The activities of a number of high-profile hacktivist groups without the financial motives of previous years, have made uncomfortable headlines for many companies, raising cyber security as a topic among a much wider audience.

James Lyne | 13 Dec | Read more

A new focus for IT security?

Phil Vasic, regional director, APAC, at software security firm Clearswift explains why the growing pace of change in Web 2.0 technology and its integration into existing IT infrastructures make the requirement for a clear, effective and workable IT security policy more important than ever before.

Phil Vasic | 07 Dec | Read more

Creating a governance framework for cloud security

Cloud computing is revolutionising the way organisations across the world use technology. Despite the stigma cloud computing has gained following a series of high-profile data breaches, the cloud CAN be secure. Patrick Eijkenboom, principal consultant at NetIQ, discusses the importance of using a governance framework for a secure cloud computing environment, regardless of the model you adopt.

Patrick Eijkenboom | 30 Nov | Read more