From our blog: post on Government large and small

Privacy in an information age – Does it exist?
The Four Corners program that aired tonight "In Google We Trust" was interesting if a little alarmist as these things sometimes are. But it did make some good points about privacy in the information age. There was an interesting piece of information about the NSW...
NSA/GCHQ built vulnerabilities into encryption?
Have the NSA and GCHQ been building vulnerabilities into commercial encryption products? If this is true, another argument for open source software has been made. Articles in the New York Times and the Guardian alleged that the N.S.A. has been deliberately weakening...

Cyber-Security doesn’t stop at the virtual perimeter
News that the New York Times was hacked by the Syrian Electronic Army is interesting not because of the fact that NYT was hacked by the hacking group, but by the method of gaining access. According to this article, information security at the NYT fell over because...
A culture of entitlement is corrosive
A culture of entitlement is corrosive in a government agency or any organisation I've just come across a USA government document which is both fun to read and educational. Its called the Encyclopedia of ethical failure 2013, its published by the US Defense department....
Information Security for health practitioners
Is it possible for health practitioners to achieve information security? Maybe a better question is "How can health professionals balance privacy, information security and accessibility in an online world?" Or even, should the medical profession be bothered with...

Hacking the spies – or how to counter the cyber insurgency
You may have seen some fairly alarmist reporting from the ABC about Chinese interests hacking ASIO, Australia's version of the FBI. New espionage? For those who haven't seen it. The allegations come from the Four Corners program and relate to compromises of...
Cloud cybersecurity, resilience, infrastructure
ENISA, Europe’s network and information security agency, just released a report looking at cloud computing from the perspective of critical infrastructure protection. ENISA asserts that 80% of large organisations will be using cloud solutions within two years. The...
Cyber threat, vulnerability and consequence trends 2013
I was asked to give a snapshot about what I thought the big risks for organisations were likely to be in the cyber world in 2013. Below are eight trends that I think are more likely than not to be important in the next twelve months. 1 Boards continue to struggle to...

Online trusted identities – a primer
"Trust is the currency of the new economy" You may have heard recently about the efforts being promoted by the USA and Australia amongst others to promote trusted online identities. There are also significant efforts in the private sector to develop online trust...
Why the world needs the cyber equivalent of an international law of the sea
I've been thinking for the best part of the last decade about Internet governance and its impact on national security. In that time, little has changed to improve security for users. The Internet as we know it today can be compared in many ways to the high seas during...
Recently seen here