Victorian Auditor-General warns about poor ICT security
Nearly 12 months after security gaps were first flagged across Victorian agencies’ ICT systems, little progress has been made, the state’s Auditor-General, John Doyle, has warned.
Nearly 12 months after security gaps were first flagged across Victorian agencies’ ICT systems, little progress has been made, the state’s Auditor-General, John Doyle, has warned.
Security planners are racing to close gaps across networks and ICT infrastructure. But they have overlooked a Trojan horse already inside the gate, Attorney-General, George Brandis has warned.
CISOs and CSOs need to start marketing IT security as a “brand” to the business or risk getting left out of business decisions, according to Woolworths group information risk manager Peter Cooper.
Although a mining pool last month managed to briefly control the majority of the computing power used to generate the Bitcoin crypto-currency, a so-called '51 per cent attack' remains unlikely.
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead.
Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.
There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.
It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
Earlier this week Richard Stiennon published an article that questions the value of risk management in IT, and I would argue that, although risk management presents challenges to IT, best practice-driven approaches leveraging aspects of risk management are essential to good security.
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
When you're on an airliner and fly through layers of clouds, you see first-hand that they come in many forms - sometimes hazy, sometimes translucent and sometimes so dense that you can't see through them. In many ways, Cloud computing is similar - there are lots of grey areas, and it's hard to know exactly what you might get from each Cloud offering.
New South Wales government departments have been given a clean bill of IT security health by the Auditor-General, but several recommendations for future preventative care have been issued.