Four of Australia’s security firms have questioned whether enough is being done to defend businesses and organisations against security attacks by cybercriminals in the wake of a report by the Office of the Australian Information Commissioner (OAIC) revealing malicious or criminal attacks dominated data breaches over a three month period to the end of June.
Businesses that earn the trust of their customers by being responsible stewards of their information will be rewarded with loyalty and positive word-of-mouth recommendations, Mark Perry, the chief technology officer of cloud security firm Ping Identity says.
A mix of large, medium-sized and small IT businesses have generally welcomed the measures in the Federal Budget that affect their industry, though the government's meddling in encryption — as evidenced in the passage of the encryption law last December — did not exactly earn many cheers.
The latest data breach report from the Office of the Australian Information Commissioner indicates that organisations which do not use multi-factor authentication for customers, employees and sysadmins are not using a relatively simple method of minimising risk, an IT security industry professional claims.
Increasing complexity within the monitoring and control core infrastructures of Australia’s utility operators may make them more susceptible to cyber attacks that could cause widespread disruption across the country, according to a warning from industry experts.
A Melbourne-based lawyer and business adviser says the new data breach notification law will not be the only one working to potentially internalise the costs of a breach.
Australia's data breach law, which takes effect on 22 February, will be among the weakest in the world and is unlikely to impose any pressure on businesses to change the way they protect personal data at the moment, the founder and chief technology officer of a cyber security consulting firm claims.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]