Accenture buys Australian security firm Redcore
24 August, 2016 by Dylan Bushell-EmblingAccenture has agreed to buy Melbourne-based Redcore to expand Accenture Security's capabilities in IAM and security-as-a-service.
Passwords are broken: Centrify executive
22 August, 2016 by Dylan Bushell-EmblingVisiting Centrify executive David McNeely believes it is time to address the fact that passwords are the weak link in security, responsible for the majority of data breaches.
South Australia Police choose NEC facial recognition
02 August, 2016NEC Australia has been selected to deliver South Australia Police's (SAPOL) facial recognition system.
Standards body warns against SMS for 2FA
27 July, 2016 by Dylan Bushell-EmblingThe US National Institute of Standards and Technology has advised against the use of SMS for two-factor authentication verification, and may disallow the technology altogether in the future.
61 government agencies want access to telco metadata
19 January, 2016 by Dylan Bushell-EmblingThe government has disclosed that 61 agencies, including federal and state departments, regulatory bodies and even one city council, have requested access to data under the metadata retention scheme.
Two-factor authentication – 5 points you need to know
28 August, 2015Once you have decided to implement two-factor authentication, what is the next step? With the multitude of solutions available in the market today, how do you know which is going to be right for your organisation?
KPMG Australia buying IAM vendor First Point Global
24 March, 2015 by Dylan Bushell-EmblingKPMG Australia will purchase identity and access management vendor First Point Global as part of wider efforts by the KPMG global network to augment its global security capabilities.
Identity access management you can bank on
26 November, 2014ING DIRECT, one of Australia's largest banks, has successfully rolled out an identity access management system that has dramatically improved turnaround times and efficiency, and decreased risks.
Nude photo leak shows that passwords are passé
29 September, 2014 by Dylan Bushell-EmblingPasswords are a flawed method of maintaining online security and should be replaced with identity management systems, Centrify Regional Manager Derek Morwood has argued.
Single sign-on: solving the password proliferation problem
08 September, 2014 by Stephen WithersHaving multiple passwords combined with numerous redundant sign-on processes poses both a security risk and a productivity loss for business. A single sign-on system is the answer.
Is a password manager right for you?
11 August, 2014 by Dylan Bushell-EmblingOrganisations need to weigh up all the pros and cons of password managers to decide if they meet their needs, or whether SSO is a better option.
EU court backs "right to be forgotten"
21 May, 2014 by Dylan Bushell-EmblingGoogle has been ordered by an EU court to remove links to two pages a Spanish man would rather the internet "forgot", in a case that could have major implications for all online companies.
Ten tips for user password security
03 February, 2014 by David Attard*We keep on hearing of more and more password leaks, hacks, identities being stolen and loss of personal information. Help your users generate better passwords - and look after them better - with these tips.
Google's "privatised surveillance" breaks Dutch law
05 December, 2013 by Dylan Bushell-EmblingDutch regulators have declared Google's practice of aggregating user data to be a breach of local law, in a case which could have wider implications for the firm in the EU and elsewhere.
Management of security risk in information technology
12 November, 2013The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines.