Intrusion detection systems and firewalls that detect and prevent network compromise are critical elements in any secure network environment. But, let’s get real: Many people lack working backups and decent password controls, let alone dedicated defensive gear.
Stories by Nikolai Hampton
Linux kernel security vulnerabilities are often in the headlines. Recently it was revealed a serious kernel vulnerability remained undiscovered for over a decade. But, what does this mean in a practical sense? Why is security of the Linux kernel important? And, what effects do vulnerabilities have on older or obsolete kernels that are persistent in many devices?
Your IT and information security processes should support your business activities. They should fit in with your organisation and be aligned with your goals, technologies, staff and capabilities.
Documented and easy to understand security policies are essential for securing your organisation against cyber attack.
The federal government has begun the process of introducing Notifiable Data Breach legislation, which will require many businesses and organisations to notify customers at risk of serious harm due to “unauthorised access” to personal and financial information.
Much of what you’ve heard about the blockchain revolution is nothing but snake oil and marketing spin. This new technology has been touted as the cure-all for performing secure and trusted transactions. The mere mention of the word blockchain sends fintech and banking execs into frenzy.
A storm has erupted over the theft and black-market sale of the US National Security Agency’s hacking tools. Edward Snowden revealed the widespread use of 'offensive security' tools in 2014. Since then, industry commentators have suggested that the tools and tactics used by the NSA may greatly harm Internet security.
The Australian 2016 Census has sparked much debate and consternation among privacy advocates and security professionals alike.