Quantcast
Channel: CSO Online - #techingovau RSS feed
Browsing latest articles
Browse All 22 View Live

The balancing act – security and flexibility

Winning the prize for longest title at the Technology in Government summits was “Collaboration, Control and Cyber security: How do you continue to provide mobile data access and collaboration in the...

View Article



Security skills deficit even hits ACCS as momentum builds industry, research...

More than a year into her role as head of Australia's top-level Australian Centre for Cyber Security (ACCS), Dr Jill Slay is driving information-security research and skills-building investments and is...

View Article

Crypto tells the bad guys what to target

As one of the architects of the popular PGP program, you’d expect Peter Gutmann from the Department of Computer Science at the University of Auckland to be extolling the virtues of encryption for...

View Article

Better security leads to simplification

If there’s one thing we’ve learned about the infosec scene, it’s that there’s no single path great professionals take. For example, Rosie Jessop, the Head of Security for the Office of the CTO in the...

View Article

Security is in the architecture – it’s not a bolt on

As chief of the National Security and Intelligence, Surveillance and Reconnaissance Division for DSTO, Dr Tony Lindsay is well placed to see the country’s threat landscape and provide insights into the...

View Article


​Open Data is the Start of Open Government

At this week’s Technology in Government conference, held at the National Convention Centre in Canberra, there was a clear, recurring theme in the presentation I attended.

View Article

​The Next Five Years of Security Threats… or not

This article was going to be a report on a session from the recent Technology in Government conference held in Canberra. The title of the session promised a great deal – “The Next Five Years of...

View Article

​We’re from the government. Who are you?

We all suffer multiple personality disorder. Visiting a bank or government agency, or even logging on to social media requires that you identify yourself using some sort of credential.

View Article


​Collaborating to Create Stronger Intelligence Networks

It would be easy to sit back and think that all the threat actors out there, trying to break into our systems to steal data or cause mayhem, are working in isolation. But the days of the lone wolf...

View Article


​Homeland Security shares initiatives for securing government services from...

Gregory J. Touhill is a retired Brigadier General from the US Air Force and is currently the Deputy Assistant Secretary in the Office of Cybersecurity and Communications for the U.S. Department of...

View Article

​The identification game – proving who you are

It’s probably the most critical question ever asked from an infosec point of view. Who are you? Proving the identity of people and systems that connect to your network and access your data is a...

View Article
Browsing latest articles
Browse All 22 View Live




Latest Images