Forget detection: in Security 2.0, visibility is the key to long-term protection
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
The security threats posed by external and internal intruders cannot be overstated, and will become even more significant as compliance and operational requirements continue to tighten.
David Braue | 18 Jan | Read more
The rapidly rising tide of cybersecurity attacks has naturally driven security and IT managers to strengthen their perimeters and bolster their defences. But without paying similar attention to what’s happening on their internal networks, they are leaving massive blind spots that could potentially produce catastrophic results.
David Braue | 13 Dec | Read more
Metadata has been in the news over the last couple of years.
Anthony Caruana | 02 Aug | Read more
Information security's roots in IT have traditionally left CIOs and CISOs wrestling to contain the business risks it creates, but growing board and C-level involvement in cybersecurity is reshaping that tradition as business guidance holds cybersecurity practitioners to new standards of governance and risk management.
David Braue | 29 Jun | Read more
Poor visibility means Australian businesses are flying blindly into the cloud Cloud usage is exploding but visibility compromises mean businesses can’t ensure the security of their new environments. Businesses are steadily moving mission-critical applications into the public cloud but three-quarters of them are still using the wrong tools to manage them.