From our blog: post on Government large and small

Security of Critical Infrastructure (SOCI) changes- How does it affect organisations?
Critical Infrastructure ProtectionRecent updates to the Security of Critical Infrastructure (SOCI) Act broaden the definitions of critical infrastructure.The federal Parliamentary Joint Committee on Intelligence and Security (PJCIS) made fourteen recommendations in...

Achieving Positive Security Outcomes
Thanks to John Bigelow of the ASIAL Insider podcast for the conversation about the ways security managers and executives can use behavioural economics to drive positive security outcomes in their organisations. You can listen to the episode...

Security Professionalisation in Australasia
Security Professionalisation in Australasia Security Professionalisation is an issue that all who are involved or care about societal resilience should be concerned about. I've just written an article for Security Solutions Magazine talking about the efforts that a...

Privacy Safe Harbour and Australia
Privacy ‘safe-harbour’ and Australia - not safe enough? The decision by the European Court of Justice to declare the Safe Harbour arrangements between the US and EU invalid will have interesting repercussions not only for European citizens and companies such as...

Good cybersecurity is repetitive and boring
The loss of 4 million records reminds agencies that good Cybersecurity is repetitive and boring The US Government announced on 4 June that the private information of at least four million current and former government workers had been compromised. The intrusion...
Sydney Siege
The siege in a chocolate shop in Sydney's CBD ended early this morning AEST. Three people died, including one purported to be the gunman Haron Monis. There will necessarily be intense scrutiny on the forces used to resolve a violent event. However, it is important to...

Trusted Insider cont.
Trusted Insider continued Part 2 of 2 talking about the trusted Insider and how organisations can address the problems at an organisational level In part 1 of this we talked about who are the trusted insiders, why organisations are concerned and what the motivations...

The trusted insider
The trusted insider. Helping organisations protect themselves against trusted insiders I attended the Security in Government (SIG) conference in Canberra earlier this month. I am somewhat biased, but I think that SIG is probably the best annual security related...

Cyber resilience update
Cyber resilience One of the most important aspects of resilience in the information age is understanding the environment in which we exist. Resilience is adaptability in a changing environment, the more we understand that change, the less painful it is. Here are a few...
Over-classification restricts information sharing
Over-classification in government continues to restrict information sharing according to a report by the US Department of Defense Inspector General. Balance in Information Security I've written previously about over-classification and why it needs to be actively...
Recently seen here