From our blog: post on Government large and small

Privacy in an information age –  Does it exist?

Privacy in an information age – Does it exist?

The Four Corners program that aired tonight "In Google We Trust"  was interesting if a little alarmist as these things sometimes are. But it did make some good points about privacy in the information age. There was an interesting piece of information about the NSW...

read more

NSA/GCHQ built vulnerabilities into encryption?

Have the NSA and GCHQ been building vulnerabilities into commercial encryption products? If this is true, another argument for open source software has been made. Articles in the New York Times and the Guardian  alleged that  the N.S.A. has been deliberately weakening...

read more
Cyber-Security doesn’t stop at the virtual perimeter

Cyber-Security doesn’t stop at the virtual perimeter

News that the New York Times was hacked by the Syrian Electronic Army  is interesting not because of the fact that NYT was hacked by the hacking group, but by the method of gaining access. According to this article, information security at the NYT fell over because...

read more

A culture of entitlement is corrosive

A culture of entitlement is corrosive in a government agency or any organisation I've just come across a USA government document which is both fun to read and educational. Its called the Encyclopedia of ethical failure 2013, its published by the US Defense department....

read more

Information Security for health practitioners

Is it possible for health practitioners to  achieve information security?  Maybe a better question is  "How can health professionals balance privacy, information security and accessibility in an online world?" Or even, should the medical profession be bothered with...

read more

Cloud cybersecurity, resilience, infrastructure

ENISA, Europe’s network and information security agency, just released a report looking at cloud computing from the perspective of critical infrastructure protection. ENISA asserts that 80% of large organisations will be using cloud solutions within two years. The...

read more
Online trusted identities – a primer

Online trusted identities – a primer

"Trust is the currency of the new economy" You may have heard recently about the efforts being promoted by the USA and Australia amongst others to promote trusted online identities. There are also significant efforts in the private sector to develop online trust...

read more

Categories

Link to us on Google Plus