DEF CON 25 recap: entertaining and enlightening, with some controversial presentations

From iOS kernel debugging to “Rickrolling” voting machines, DEF CON 25 this year was, as usual, highly entertaining. DEF CON 25 was held in late July at Caesar’s Palace in Las Vegas. Well over 10,000 hackers, penetration testers, red teamers, vulnerability researchers, technical writers, bug bounty hunters, incident responders, students, and the likely “Feds” attended. […]

Read more

Protecting sensitive data: how your business can stay smart online

Most business leaders are aware that the risk of being targeted by cybercriminals is only getting worse, while attacks are getting more sophisticated and devastating. With cybersecurity tools also getting stronger and more widely adopted, the weak point for most organisations remains their people.   Phishing scams are a key concern because they use social […]

Read more

How your online activity compromises your privacy and data

Most Australians are used to living in a digital world now, sharing every aspect of our lives via social media. But you might be surprised to find out just how easily someone can gain access to your social media accounts. All you need to do is use the same public network as a hacker and, […]

Read more

Cybersecurity evolution continues: seven changes in seven years

Since Aleron was established in 2010, the cybersecurity industry has continued its fast-paced evolution. To celebrate our seventh anniversary, we’ve made a list of the seven biggest changes we have seen in the industry in the past seven years.   1. Hacking has gone professional The cybersecurity game has heated up significantly. Seven years ago […]

Read more

Digital transformation: balancing risk with the need for innovation and growth

A few weeks ago, I moderated a panel at the Emerging Cyber Threats Summit in Sydney which discussed cybersecurity and the future of the digital economy. It was a stimulating discussion with key thought leaders in the cyber security space covering questions such as: what is digital transformation; why do we need to consider cybersecurity […]

Read more

How to address the security risks created by big data

Australian organisations are collecting and storing a growing amount of data which is making them an attractive target for local and international cybercriminals.   Never before has so much information been so readily available to organisations. Businesses that have worked out how to aggregate and analyse that data effectively are reaping benefits such as better, […]

Read more

Security reviews and penetration testing: why you may need to take a more proactive approach to cyber security

In its latest 2016 report, the Australian Cyber Security Centre reported over 14,000 cyber security incidents, including 1,095 incidents on government systems which were considered serious enough to warrant operational responses. Protecting your business effectively starts with proactive security reviews that include penetration testing. An effective security review could have picked up the vulnerabilities that […]

Read more

Mandatory data breach notifications: What does the new scheme mean for Australian businesses?

Following numerous attempts, Australia now has a mandatory data breach notification scheme in place via the government’s Privacy Amendment (Notifiable Data Breaches) Bill 2016, which has been passed into law as the Privacy Amendment (Notifiable Data Breaches) Act 2017. The law requires businesses and government agencies to notify the Privacy Commissioner and customers if they […]

Read more

Ransomware puts companies on edge

The latest global ransomware attack, WannaCry, put he world on edge. Rob Wainwright, executive director of Europol, the European Union’s police agency, said the cyberattack hit 200,000 computers in more than 150 countries, and that was just at the beginning of the attack. The impact in Australia has been minimal but, if you haven’t been […]

Read more

Why business cybersecurity hygiene must start at home

Two simple ways to protect your online identity If you’ve ever forgotten your password to an online account then you’ll know how easy it is to reset. Simply enter your email address and the site will email you a link to reset your password. So imagine how easy it would be for a would-be hacker […]

Read more