Hacking Games: A Proving Ground for Tomorrow’s Infosec Leaders

The headlines seem to be dominated by hacks lately. Some of the top TV shows around the world heavily feature cybersecurity plot points and hackers, both ethical and not, as key characters. Cybersecurity and the consequences of getting hacked has entered popular culture in new ways over the last several years, but according to industry […]

Continue Reading

Encryption Is Not Solving All Cybersecurity Problems

I visited last week the IAA in Frankfurt, Germany. IAA stands for International Automobile Exhibition and takes place every year in Frankfurt, Germany. This is the place where every year the latest cars are being presented but also the newest technologies around cars. This year it was a lot about mobility, interaction, autonomous parking and driving, […]

Continue Reading

Automation in Network Security: Friend or Foe?

If you are like most security professionals, you probably feel overwhelmed just thinking about your to-do list: update policies, run reports, extend protections, analyze results, find hidden threats, manage multiple deployments… That list is endless. Automation seems to be the perfect answer, but most security professionals are torn between the idea of automating and streamlining […]

Continue Reading

The Australian Threat Environment

The Australian Cyber Security Centre (ACSC) has released its first unclassified Threat Report [1], which describes a number of cyber adversaries targeting Australian networks, explaining their motivations, the malicious activities they are conducting, and their impact. This threat report also provides a number of examples of activity targeting Australian networks during 2014. The report further […]

Continue Reading
%d bloggers like this: