Critical infrastructure operators remain vulnerable to attack from hackers whose motivations have matured from the “pretty juvenile” wanton vandalism of the 1990s to the aggressive, targeted and financially-motivated cyber war being waged online today, a one-time senior security advisor to the US president has warned.
Stories by David Braue
It wasn’t too long ago that security vendors were touting new ‘heuristic’, or behaviour based, analysis as a newfangled way to spot new viruses that were generated by hacker toolkits and didn’t match any known signature on file. These days, however, heuristics are less a luxury than the standard operating procedure as globally connected malware authors spew new threats faster than ever and even the most diligent companies continue to suffer the indignity of successful security attacks.
Australia may be located half a world away from the heavily-populated European and US zones, but that hasn't stopped us from claiming the crown as one of the world's most heavily-attacked countries, according to figures released this week as part of Symantec's latest Symantec Intelligence Report.
Large-volume hackers have become cloud pioneers, utilising public infrastructure to threaten companies that often effect ambitious but poorly-considered cloud-computing strategies, a security industry technologist has warned.
They may not say it out loud, but I'd bet most network managers and security executives tell themselves over and over again that their end-users are idiots.
Internet service providers (ISPs) and telecommunications providers may be plotting their moves to embrace next-generation IPv6 network protocols, but a massive base of legacy IPv4 equipment will complicate things for a long time to come, executives of both Telstra and NBN Co have warned.
Security managers must break down their walled-garden mentalities and integrate security deep into the heart of increasingly flexible, BYO computing-driven IT service management (ITSM) environments or risk data death by a thousand cuts, a systems and security consultant has warned.
It's hardly the kind of thing any company wants attached to its name, but HTC's rapid acknowledgment of confessed "serious" security exploit, discovered and published this week by security researchers, may ultimately help deflect criticisms and will, regardless, serve as a valuable reminder to CSOs that mobile devices represent a new and still-evolving security threat within the enterprise.
Concerned that your employees are being a bit lax when it comes to looking after their laptops? Steal them yourself, one vendor has advised in the wake of yet another damning security report that suggests laptops and other equipment are literally walking out of Australian companies that are still operating at far below world's best practice when it comes to device security.
If your company is like most, you've been wrestling carefully with the security protections necessary to manage demand for bring-your-own (BYO) computing policies. You may even work at Suncorp or one of the other organisations, that have embraced the idea as a way to reduce IT costs and boost employee satisfaction.
Interesting revelations invariably emerge when a high-profile entity is scrutinised, intensely and unforgivingly, by those who are convinced it's too good to be true. Case in point: Julia Gillard. The NBN. Miley Cyrus. And Facebook, of course, which this week was pulled into yet another privacy scandal that should surprise absolutely nobody – and offer yet another reason why CSOs should be very, very careful when it comes to use of social media within their company's four walls.
- Programmer Analyst - Brisbane VIC
- Junior-Mid Level Software Support/Project Coordinator QLD
- Cognos Lead / Cognos Developer ACT
- User Research / UX Designer ACT
- Developer - Kofax VIC
- Service Desk Consultant NSW
- ServiceNow Technical Architect - CANBERRA BASED VIC
- Presales Security Solutions Architect VIC
- Software Developer NSW
- Desktop Support Engineer NSW