Blogs2021-09-24T18:53:33+10:00

SWIMMING ABOVE CEO FRAUDS

By |06/04/2023|

CEO frauds, in which cyber criminals impersonate chief executive officers of organisations and lure unsuspecting victims into authorising fraudulent transactions are not new, but they have become more prevalent and more sophisticated. With more women taking up CEO roles in organisations, we need to be conscious of how we [...]

LIFECYCLES WITHIN SECURITY

By |06/04/2023|

Do you remember learning about the lifecycle of a butterfly? A tiny egg turns into a caterpillar that encases itself in a cocoon of silk from which, after a time, a beautiful butterfly emerges. Security processes can be thought of as cycles of continuous improvement that must occur within [...]

WHY THE TRENDS IN CRYPTOGRAPHY ARE TRENDS?

By |06/04/2023|

Cryptography is the aspect of cybersecurity about which I am most knowledgeable. And (I may be biased) it’s the core of cybersecurity. Sharing is caring, so I would like to give you some information about cryptography, especially about recent trends, and where they are heading. Cryptography uses mathematics to [...]

THE 10 COMMANDMENTS OF HUMAN ERROR

By |06/04/2023|

THOU SHALT UNDERSTAND YOUR ROLE IN CYBERSECURITY Let us start with the stats and nothing but the stats. In a recent report from Stanford University, 88% of data breaches are caused by human error. In the same report, “One third of respondents (33%) told us they rarely or never [...]

MANAGING DATA RISKS IN INDUSTRIAL CONTROL SYSTEMS

By |06/04/2023|

Industrial control systems (ICS) are critical for the delivery of power, water, transport and other essential products and services. This makes them a favoured target for cyber criminals motivated by financial gain or ideology. Attacks can also come from market competitors or employees with malicious intent. Compromise of an [...]

“SHARE TODAY, SAVE TOMORROW”

By |06/04/2023|

On the 2nd of March, news broke revealing that multiple zero-day Microsoft Exchange vulnerabilities had been exploited. AusCERT quickly communicated this news to its members by retweeting the active exploitation advisory from Volexity, a security firm based in Reston, Virginia USA. This was quickly followed by a security bulletin [...]

Start-ups, why you need to get security right from the start

By |06/04/2023|

Security is important in any business, right? What about start-ups? Are they any different? Do they need to have a focus on security? They are fast-moving and innovative businesses that do not always have a free-flowing budget to spend on cybersecurity. They want to focus on the core function [...]

HOW SECUREWORKS CHAMPIONS FEMALES IN SENIOR ROLES

By |06/04/2023|

In 2020 the proportion of women in senior management roles globally was just 29 percent1 . This would be a remarkable statistic in any year, but in the midst of a global pandemic, when one in four women were considering leaving the workforce to focus on caregiving, this was [...]

BUILDING THE FOUNDATIONS OF A NEW DATA ECONOMY

By |06/04/2023|

For Joanne Cooper, CEO of ID Exchange Pty Ltd, which in December 2020 launched the Australian Data Exchange brand, a secure data sharing service, the opportunity offered by secure sharing of personal data was obvious. Data shared with consent, she says, offers enormous potential for innovation and personalised services [...]

Go to Top