Advertisement

cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Episode 2: Three things that keep Biogen CISO Bob Litterer up at night

Podcast Episode 2: Listen now as Bob Litterer, VP and CISO of biotech giant Biogen, talks about the interdependencies in his company’s third-party network -- and how a data breach anywhere in that ecosystem could have a devastating...


mobile phone messaging email network collaboration tools

With email security, some things can't be outsourced

You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know.


A businessman inside smart phone with a loud speaker shouting to another man [Attention, noise]

Can you protect your data when it’s no longer inside your network?

As if bring your own device (BYOD) trends hadn’t created enough grief for data-security managers, widespread decentralisation of data in the cloud is proving to be an even bigger problem – with usage surging and a new study...


Advertisement

distributed / decentralized cloud network connections

The unassuming threat of IoT devices in Australian workplaces

When thinking of objects in a business that pose a data security risk, a fridge or fish tank wouldn’t likely come to mind. IoT continues to grow more and more ubiquitous, fuelled by the promise of greater efficiency and advanced...


CSO: Have you met these hackers? [slide 01]

What is Shadow IT?

Shadow IT is the use of IT software or hardware by a department or an individual outside of – or even without the knowledge of – the IT department. A decade ago, Shadow IT was quite limited in scope. Employees would use unapproved...


Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Never trust always verify

Over the last five years, the number of data security breaches worldwide has risen 67 percent and with it, the cost of cyber-crime has alarmingly climbed 72 percent. Threats have become more complex and sophisticated as businesses...


cyber security abstract wall of locks padlocks

Zero Trust – Demystified

Everyone seems to be talking about Zero Trust in the security world at the moment.  Unfortunately there seems to be multiple definitions of this depending on which vendor you ask!  To help others understand what Zero Trust is, I...


abstract background technology data binary plotted points

Every day should be Data Privacy Day – but especially today

Companies must own the privacy conversation by helping users protect what little privacy they still have left


Encrypted blocks of multicolored data cubes rolling out.

Aussie police usage of new anti-encryption laws is on the rise

Australian law enforcement didn't widely use new powers under the late-2018 Assistance and Access Act in the first half of 2019, but usage more than doubled in the second half of 2019.


Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.


Advertisement

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.


IT staff setting server hardware in a data center.

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be.


workers / staff / employees / businessmen / corporate cubicles / offices

Australian companies struggling to fill cybersecurity positions

Faced with constant reports of serious breaches and an increasing need to secure critical data and systems, many Australian businesses are finding it almost impossible to hire sufficient cybersecurity professionals. Competitive...


hacker / hacking - crime / breach / phishing

Counter-hacking: Globally offensive, or worth a go?

Cybersecurity budgets in Asia are growing fast – more than 25% per annum in China, and around 20% per annum in parts of South-East Asia. And that’s a welcome sign, because the array and volume of threats faced by businesses both...


automation gears lightbulb machine learning ai innovation by bananajazz getty

How machine learning can secure corporate data in the Cloud

As organisations move growing volumes of data to the cloud, cyber security strategies need to be augmented with next-generation machine learning technologies in order to boost threat-protection capabilities. The shift to...