Advertisement

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Defining identity and trust in today’s digital world

While the concept of ‘identity’ has become a critical element in an increasingly digital world, defining exactly what it is remains an ongoing challenge. This is odd because when it comes to effective cybersecurity, having a valid...


facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?


cybersecurity  >  information security / data protection / lock / shield

What is information security? Definition, principles, and jobs

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.


Advertisement

Microsoft’s offers Application Inspector to probe untrusted open source code

Microsoft has released the Microsoft Application Inspector, an open source .NET Core command-line tool for Windows, Linux and macOS that developers can use to analyze third-party open source software components for newly added...


cyber attack

Infrastructure cyberattacks pose a clear and present danger in 2020 and beyond: WEF

Impact of cybersecurity attacks, data theft eclipsed only by climate change, weather


multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.


teamwork / collaboration / developers / development / engineers / binary code / virtual interface

Vulnerability management requires good people and patching skills

Multinational construction materials maker LafargeHolcim focuses hard on patching to prevent potential exploits further down the line.


digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.


Threat assessment  >  Differentiating elements / good vs. bad / angel vs. devil amid abstract data.

Increasing cyber threats will force organisations to embrace cloud security in 2020

For most organisations, cloud computing offers better security than they could have ever imagined having on premise. With increasing cybersecurity threats and attacks more organisations will embrace cloud security in 2020 and make...


fog obscures the horizon beyond a highway / uncertainty / unknown future

Strong security in the present makes for a successful future

Data breaches are storming the world, costing businesses millions of dollars and impacting the reputations and financial stability of organisations. According to IBM Security’s 2019 ‘Cost of a Data Breach’ Report, in Australia,...


Advertisement

security firewall breach hacker privacy battle id work getty

Is your home security system being hacked?

The Internet of Things (IoT) trend shows no signs of slowing down. In Australia, the market stood at $7.9 billion in 2018 and is projected to reach $25 billion by 2024, a dramatic increase that accounts  for the rising demand of...


cyber security digital concept with shield picture id1126779135

How to achieve more effective cybersecurity protection in 2020

In the early 1990s, Northern Irish pop group D:Ream raced to the top of the charts by singing ‘Things can only get better’. But unfortunately, when it comes to cybersecurity in the 2020s, the opposite is very much the...


cybersecurity privacy safety internet binary

Forecast: the top 6 cybersecurity trends for 2020

Amid constant reports of breaches and data thefts, cybersecurity topped the list of concerns for Australian IT professionals throughout 2019. In 2020, these concerns will become even greater. Increasing use of cloud platforms and...


distributed / decentralized cloud network connections

Cloud adoption trends: Infrastructure, apps and security

The rate of cloud adoption worldwide has never been greater -  a recent report found that 86% of enterprises have deployed cloud-based tools. As businesses migrate their data, apps and workloads, it is critical that cyber security...


artificial intelligence ai brain digital

AI is not a cybersecurity silver bullet (but it does make life a lot easier)

Artificial Intelligence (AI) is not a panacea for all information security tasks and challenges. But used appropriately, and with expectations firmly in check, it can be a very effective tool in drastically reducing the often...