How Australia Post’s cybersecurity educators beat the 8-second attention span
Contextualise education campaigns to convince employees why they should care
David Braue | 31 Oct | Read more
Contextualise education campaigns to convince employees why they should care
David Braue | 31 Oct | Read more
Burgeoning adoption of cloud-based solutions has pushed issues of identity management front and centre for Australian companies as they work to modernise their application infrastructure, the chief security officer of Okta has reported as the company this week moved to tap into local demand by opening its new Asia Pacific headquarters in Sydney.
David Braue | 14 Sep | Read more
As organisations grapple with the opportunities and challenges posed by digital transformation, many are realising the important role identity management will play.
Mark Perry | 23 Feb | Read more
It’s probably the most critical question ever asked from an infosec point of view. Who are you? Proving the identity of people and systems that connect to your network and access your data is a critical element of your security posture.
Anthony Caruana | 10 Aug | Read more
Gregory J. Touhill is a retired Brigadier General from the US Air Force and is currently the Deputy Assistant Secretary in the Office of Cybersecurity and Communications for the U.S. Department of Homeland Security.
Anthony Caruana | 09 Aug | Read more
It would be easy to sit back and think that all the threat actors out there, trying to break into our systems to steal data or cause mayhem, are working in isolation. But the days of the lone wolf sitting in a darkened room, with a hoodie pulled low over their face, are well behind us.
Anthony Caruana | 09 Aug | Read more
We all suffer multiple personality disorder. Visiting a bank or government agency, or even logging on to social media requires that you identify yourself using some sort of credential.
Anthony Caruana | 08 Aug | Read more
Identity management, as Gartner defines it, is the "security discipline that enables the right individuals to access the right resources at the right times for the right reasons.
Yahoo has revamped its Yahoo Mail app with a new take on sign-in that aims for a frictionless login process with an in-app delivered one-time password— but it’s pretty easy to get locked out.
Changes to security exposure, driven by shifting organisational network boundaries, have driven a resurgence in identity and access management (IAM) that has the government committing to significant IAM frameworks and private companies retrofitting IAM to legacy systems. Yet for fast-growing digital business REA Group, a flexible IAM environment has rapidly evolved from being a nice-to-have into a fundamental element of the company's IT strategy.
David Braue | 18 Aug | Read more
Continuous evaluation of user behaviour against baseline metrics will power a new approach to authentication that lies at the heart of a joint project between Victoria's RMIT University and software giant CA Technologies that was this week ramped up with the awarding of Australian Research Council (ARC) funding.
David Braue | 27 Jul | Read more
A $33.3m investment in large-scale identity management systems will form a cornerstone of the government's Digital Transformation Office (DTO) – an umbrella effort to securely push government service delivery online – which will be fast-tracked through a $254.7m Budget allocation over four years that will see numerous other agencies chipping in to support the transformation agenda.
David Braue | 13 May | Read more
<a href="http://gurucul.com/">Gurucul</a> is extending its identity-based threat detection to cloud-based applications with a new platform that monitors who has access to what and what they are doing with it.
Tim Greene | 18 Apr | Read more
Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS and Google Android devices.
Ellen Messmer | 15 Aug | Read more
Stop me if you've heard this one before: You should use unique, complex passwords for every login you have to manage, and you should employ a password management utility to keep track of it all. That is the prevailing advice, but a couple Microsoft researchers have come to the conclusion that it might be the wrong approach.
Tony Bradley | 18 Jul | Read more