From our blog: post on Government large and small

Security Professionalisation in Australasia

Security Professionalisation in Australasia

Security Professionalisation in Australasia Security Professionalisation is an issue that all who are involved or care about societal resilience should be concerned about. I've just written an article for Security Solutions Magazine talking about the efforts that a...

read more
Privacy Safe Harbour and Australia

Privacy Safe Harbour and Australia

Privacy ‘safe-harbour’ and Australia  - not safe enough? The decision by the European Court of Justice to declare the Safe Harbour arrangements between the US and EU invalid will have interesting repercussions not only for European citizens and companies such as...

read more
Good cybersecurity is repetitive and boring

Good cybersecurity is repetitive and boring

The loss of 4 million records reminds agencies that good Cybersecurity is repetitive and boring The US Government announced on 4 June that the private information of at least four million current and former government workers had been compromised. The intrusion...

read more

Sydney Siege

The siege in a chocolate shop in Sydney's CBD ended early this morning AEST. Three people died, including one purported to be the gunman Haron Monis. There will necessarily be intense scrutiny on the forces used to resolve a violent event. However, it is important to...

read more
Trusted Insider cont.

Trusted Insider cont.

Trusted Insider continued Part 2 of 2 talking about the trusted Insider and how organisations can address the problems at an organisational level In part 1 of this we talked about who are the trusted insiders, why organisations are concerned and what the motivations...

read more
The trusted insider

The trusted insider

The trusted insider. Helping organisations protect themselves against trusted insiders I attended the Security in Government (SIG) conference in Canberra earlier this month. I am somewhat biased, but I think that SIG is probably the best annual security related...

read more
Cyber resilience update

Cyber resilience update

Cyber resilience One of the most important aspects of resilience in the information age is understanding the environment in which we exist. Resilience is adaptability in a changing environment, the more we understand that change, the less painful it is. Here are a few...

read more

Over-classification restricts information sharing

Over-classification in government continues to restrict information sharing according to a report by the US Department of Defense Inspector General. Balance in Information Security I've written previously about over-classification and why it needs to be actively...

read more
Privacy in an information age –  Does it exist?

Privacy in an information age – Does it exist?

The Four Corners program that aired tonight "In Google We Trust"  was interesting if a little alarmist as these things sometimes are. But it did make some good points about privacy in the information age. There was an interesting piece of information about the NSW...

read more

NSA/GCHQ built vulnerabilities into encryption?

Have the NSA and GCHQ been building vulnerabilities into commercial encryption products? If this is true, another argument for open source software has been made. Articles in the New York Times and the Guardian  alleged that  the N.S.A. has been deliberately weakening...

read more

Categories

Link to us on Google Plus