The balancing act – security and flexibility
Winning the prize for longest title at the Technology in Government summits was “Collaboration, Control and Cyber security: How do you continue to provide mobile data access and collaboration in the...
View ArticleSecurity skills deficit even hits ACCS as momentum builds industry, research...
More than a year into her role as head of Australia's top-level Australian Centre for Cyber Security (ACCS), Dr Jill Slay is driving information-security research and skills-building investments and is...
View ArticleCrypto tells the bad guys what to target
As one of the architects of the popular PGP program, you’d expect Peter Gutmann from the Department of Computer Science at the University of Auckland to be extolling the virtues of encryption for...
View ArticleBetter security leads to simplification
If there’s one thing we’ve learned about the infosec scene, it’s that there’s no single path great professionals take. For example, Rosie Jessop, the Head of Security for the Office of the CTO in the...
View ArticleSecurity is in the architecture – it’s not a bolt on
As chief of the National Security and Intelligence, Surveillance and Reconnaissance Division for DSTO, Dr Tony Lindsay is well placed to see the country’s threat landscape and provide insights into the...
View ArticleOpen Data is the Start of Open Government
At this week’s Technology in Government conference, held at the National Convention Centre in Canberra, there was a clear, recurring theme in the presentation I attended.
View ArticleThe Next Five Years of Security Threats… or not
This article was going to be a report on a session from the recent Technology in Government conference held in Canberra. The title of the session promised a great deal – “The Next Five Years of...
View ArticleWe’re from the government. Who are you?
We all suffer multiple personality disorder. Visiting a bank or government agency, or even logging on to social media requires that you identify yourself using some sort of credential.
View ArticleCollaborating to Create Stronger Intelligence Networks
It would be easy to sit back and think that all the threat actors out there, trying to break into our systems to steal data or cause mayhem, are working in isolation. But the days of the lone wolf...
View ArticleHomeland Security shares initiatives for securing government services from...
Gregory J. Touhill is a retired Brigadier General from the US Air Force and is currently the Deputy Assistant Secretary in the Office of Cybersecurity and Communications for the U.S. Department of...
View ArticleThe identification game – proving who you are
It’s probably the most critical question ever asked from an infosec point of view. Who are you? Proving the identity of people and systems that connect to your network and access your data is a...
View Article
More Pages to Explore .....