Technology
Managing Cyber Incidents with Confidence: Why High-Assurance Environments Matter
Cyber incident responses rarely fail due to a lack of tooling. More often, they break down under pressure when visibility is limited, control is fragmented, and critical decisions must be made with incomplete information. In these situations, the consequence is not just delayed response, but loss of control over sensitive data, inconsistent decision-making, and increased…
Read MoreReduce Risk Without Compromising Sovereignty or Control
For Defence suppliers, compliance is not a one-time exercise. Hosting and security requirements evolve, expectations increase, and the cost of maintaining alignment can grow unexpectedly over time. The challenge is not just meeting today’s requirements, but ensuring the hosting environment continues to support Defence needs, without introducing unnecessary risk,rework, or re-platforming. Managing that risk early…
Read MoreDeploy Faster Without Compromising Sovereignty or Security
Defence suppliers are expected to move quickly while meeting strict security and hosting requirements. However, many suppliers are also slowed down by complex infrastructure decisions, lengthy onboarding processes, or platforms that were not designed with Australia’s Defence environment in mind. Finding the right balance between speed, compliance and long term viability is a constant challenge.…
Read MoreMake Security Go Away
Software builders often choose to focus on business and capability development only, leaving security of the software or system for a future date. We see today how this approach of “bolt-on later” (at best) and no security ever (at worst), is causing cybersecurity breaches. We do have to “Make Security Go Away”, but unfortunately we…
Read MoreFollow-the-sun model eclipsed by dawn of the data sovereignty age
Experts are questioning what role global cloud service providers can continue to play in key government and defence markets in light of Australia’s tough new data sovereignty standards. Given how dependant their business model is on “follow-the-sun’’ support based in multiple centres around the world, it is unclear how the tech titans can adapt to…
Read MoreHow Critical Industries Can Prepare for SOCI Act Reforms
Our nation’s critical infrastructure is a highly connected system – one that supports and drives our day-to-day operations as businesses and as a nation. However, connectivity without security creates vulnerabilities that can have immense repercussions. With this in mind, this June, the Australian Government will announce reforms to the Security of Critical Infrastructure (SOCI) Act…
Read MoreOn-premise exodus: tips for migrating legacy applications in the public-sector
At the start of 2020, IDC predicted that public and private cloud spending would outperform “traditional IT spending” – think on-premise IT and legacy applications – in the forthcoming year. Of course, they weren’t accounting for a global pandemic, which has sent cloud spending into the stratosphere, while traditional IT spending wanes. Supporting this continued…
Read MoreSecure Internet Gateways – is there a better way?
When the Federal Government introduced the Secure Internet Gateway (SIG) program in 2010, it was a great leap forward in cyber security. The program allowed agencies to easily assess and procure a range of ASD accredited SIG packages, with the ASD’s ‘stamp of approval’ providing assurance that the solution was robust and up to all…
Read MoreWhy increased data regulation is a good thing for Australian healthcare providers
Healthcare organisations – both within Australia and across the world – have traditionally been fairly slow-moving when it comes to the adoption of innovative digital services. This is especially true in the realm of cybersecurity and data privacy, with a lack of hard-and-fast regulatory guidelines resulting in a patchwork of data privacy and compliance standards. The…
Read MoreUnderstanding and strengthening healthcare organisations’ 2021 cloud strategies
After a year that shifted many corporate priorities and reinforced others, concerns around digital infrastructure and cyber security in the healthcare sector are stronger than ever. This year the government plans to make amendments to the Security of Critical Infrastructure Act, which would expand how we define “critical infrastructure” for regulatory purposes — with the…
Read More