State Governments manage and must protect a wide range of citizen information from cyber security threats, including credit card records, personal health information, employment records, revenue and tax information and election systems. With much of this information available online, State Departments and Agencies are a primary target for cyber-thieves. A 2017 cybersecurity report compiled by Verizon […]
All Blog Articles
In previous blogs, I’ve tongue-in-cheek (mostly) suggested our organisations would be a lot more protected from nefarious actors if we simply disconnected and went back to pen and paper. I may have also suggested that having employees makes enterprise security quite challenging. And Wi-Fi, visitors, BYOD, and IoT are also threat vectors: perhaps we should […]
Unless you’ve been out of contact with civilisation for the last few years, you’ll know about the Internet of Things (IoT). Just to catch you up, it’s the advent of a myriad of devices which are not only connected to the internet but also, in many cases, generate data. What sort of devices? Think about […]
Incident management isn’t too far from most CISOs’ minds in any given day. If you read the news, any news, you’d be forgiven for thinking incident equates to some kind of catastrophic breach. Well, that is an incident of course, but the reality is that in the IT management world, an incident is any kind […]
Being part of CA Veracode Verified demonstrates commitment to produce secure software Adelaide, Australia – June 12th, 2018 – Prophecy International today announced that it participates in CA Veracode Verified, a program that validates a company’s secure software development processes. With approximately 30 percent of all breaches occurring as a result of a vulnerability at […]
It seems like a silly question but how many companies take the extra steps to know that the millions of lines of code in their solutions don’t have any vulnerabilities? It’s easy to say your code is secure, it’s completely different to pay an accredited third party to review each and every line of code […]
Most of the time security professionals worry about zeros and ones – to simplify our entire industry somewhat. In essence, we’re trying to keeping our own assets protected and keeping outsiders, well, on the outside – and technology solutions, people and processes are obviously core to that. However, there’s always one big grey area when […]
In my last blog I drilled straight into the one of the biggest, ever-present threats in any network, zero day vulnerabilities. I thought in this blog I’d be a little more circumspect and talk about the broader issues keeping CISOs up at night (the overall theme of this blog series). The best analogy I can […]
- Government Contractors must prepare for Cybersecurity Maturity Model Certification
- Did You Catch Us on AustCyber?
- Using Snare to Detect a Threat
- Don’t Let Remote Workers Be Your Weak Link
- Election Security: What States and Counties need to do to protect Democracy.
- How Snare Helps with DNS CISA Directives