Search
  Advanced Search
Results
Total: 56 results found.
Refine your search by section:  Content (51)  Tags (3)  Menus (2)
Order by
  
Display
Conclusion: Cyber security can be perceived by outsiders as an occult domain. Psychologically, people can respond in many ways to something they do not understand with responses ranging from denial to fear. Consequently, a frequent challenge to better security maturity is inertia, rooted in ignorance. It is imperative that security practitioners break ...
Section: Content | Category: Security Leadership | Date: Thursday, 05 May 2016 | Hits: 239
Conclusion: There are two compelling information security reasons for creating a sense of purpose and ownership within an organisation. The first is that a sense of purpose and ownership will empower staff so that they move from responding to basic security hygiene matters, towards pre-empting issues. The second reason is so that organisations look ...
Section: Content | Category: Sourcing & Staffing | Date: Saturday, 03 October 2015 | Hits: 255
Conclusion: Bugcrowd, Hivint, Kasada, and Secure Code Warrior each has a proven capability to address an important aspect of the cyber defences of Australian organisations. The Australian Cyber Security Strategy, launched in April 2016, advocates the promotion of local capabilities where Australia can build globally competitive solutions. These four ...
Section: Content | Category: Vendors | Date: Sunday, 01 January 2017 | Hits: 339
Conclusion: Non-IT executives are often reported as being concerned about the prospect of a cyber incident, but as security is not their area of expertise, responsibility for mitigation and preparation is often devolved to IT. This is a mistake, because as much as lack of any security could be devastating, applying the wrong controls to an organisation ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 02 September 2015 | Hits: 472
35. Security
Section: Tags | Date: Sunday, 31 May 2015 | Hits: 60
Conclusion: Staff remember how leaders behave and react during a crisis, rather than when the business is operating successfully. Astute leaders do not just deal with restoration and getting the business back on deck; they also support their staff during and after the crisis and can even create the potential for the organisation to be in a better state ...
Section: Content | Category: Governance & Planning | Date: Sunday, 01 January 2017 | Hits: 783
Conclusion: This month, discussions regarding analytics and data-driven innovation have been prominent. As the role of IT changes from providing technology solutions to driving business outcomes and strategy through the use of technology agile services to support business processes and targets are required. Companies have recognised that data handling ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 02 December 2015 | Hits: 272
Conclusion: To be effective a cyber security program that controls access to hardware, software and data needs to be comprehensive and include all stakeholders. The challenge for IT and line management is to shape the message to the audience in terms they understand so they take their responsibilities seriously. Observations: Today’s print and online ...
Section: Content | Category: Security Leadership | Date: Tuesday, 04 October 2016 | Hits: 1383
Conclusion: Despite the vendor and media hype around malware threats to the hypervisor, the biggest risk to IT departments from virtualisation is insufficient procedural controls. The risk stems from virtual machines being poorly managed, growing in number, and the consequent haemorrhage of money to support them. Virtual machines should be processed ...
Section: Content | Category: Security Leadership | Date: Thursday, 29 January 2009 | Hits: 545
Conclusion: Organisations that do not treat information security risks seriously could pay a heavy price if a major incident occurs and they are unprepared to deal with it. Observations: In the last ten years the degree of interconnectedness through the Internet of organisations, their suppliers and customers and government, has increased dramatically. ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 July 2004 | Hits: 502