Main
Log in

Search
 
Results
Total: 254 results found.
Order by
  
Display
Conclusion: The security capabilities of Cloud vendors have evolved rapidly since 2008. Specifically, the three big Cloud vendors Microsoft, Google and AWS understand the importance of trust and assurance for their corporate and government customers and are each working aggressively on continual service improvement. Most customers are more likely to ...
Section: Content | Category: Security Leadership | Date: Saturday, 02 December 2017 | Hits: 394
Conclusion: On 3rd April 2018, Microsoft announced the availability of its Azure Cloud running within Canberra Data Centres (CDC) facilities, and officially rated for protected workloads. Superficially, this appears to boost Microsoft’s ability to “check off” security concerns for government and other clients that have specific compliance demands. While ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 14 April 2018 | Hits: 80
43. Security
Section: Tags | Date: Sunday, 31 May 2015 | Hits: 129
Conclusion: The IT industry has hit a breaking point where the artificial grouping of information security and IT has left many organisations vulnerable. Business units have viewed information security as an IT problem, and IT has abdicated responsibility for many aspects of operations that should be viewed as basic hygiene. It is time for organisations ...
Section: Content | Category: Security Leadership | Date: Monday, 02 November 2015 | Hits: 617
Conclusion: Unless an organisation has an already strong cyber security capability, or the budget and appetite to progress its maturity very quickly through expanding its headcount and changing business processes, it is unlikely that any security tool purchases will help. Instead, organisations aspiring to improve their cyber security maturity should ...
Section: Content | Category: Security Leadership | Date: Tuesday, 02 February 2016 | Hits: 362
Conclusion: This month, discussions regarding analytics and data-driven innovation have been prominent. As the role of IT changes from providing technology solutions to driving business outcomes and strategy through the use of technology agile services to support business processes and targets are required. Companies have recognised that data handling ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 02 December 2015 | Hits: 478
Conclusion: There are two compelling information security reasons for creating a sense of purpose and ownership within an organisation. The first is that a sense of purpose and ownership will empower staff so that they move from responding to basic security hygiene matters, towards pre-empting issues. The second reason is so that organisations look ...
Section: Content | Category: Sourcing & Staffing | Date: Saturday, 03 October 2015 | Hits: 377
Conclusion: Despite the apparent value of the DSD’s Top 35 Mitigation Strategies report, organisations considering executing its recommendations will have to weigh up the business impact of implementation. In some instances, a mitigation strategy may be too intrusive on business operations. For some, the cost of ongoing support may be too high. However, ...
Section: Content | Category: Security Leadership | Date: Thursday, 27 October 2011 | Hits: 893
Conclusion: Non-IT executives are often reported as being concerned about the prospect of a cyber incident, but as security is not their area of expertise, responsibility for mitigation and preparation is often devolved to IT. This is a mistake, because as much as lack of any security could be devastating, applying the wrong controls to an organisation ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 02 September 2015 | Hits: 543
Conclusion: Dedicated IT security people are too expensive for SMB organisations. The market trend is towards outsourcing security tasks, and the SMB market must embrace this. Large organisations (500+ people) should make internal security people the managers of internal security programs, and managers of the relationship with managed security service ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 April 2007 | Hits: 553

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

       
Recently Viewed Articles