What does the future of cybersecurity look like?

published by James Olsen. 15:32:35GMT+10 Wednesday, March 26

In 2024 the Australian and Queensland governments confirmed a $1B investment into the production of a working quantum computer; meanwhile Microsoft and IBM continued to experience breakthroughs in this ongoing technological arms race. We are rapidly approaching the point of commercial quantum computers, yet few organisations are prepared for these significant changes.

With these threats to cybersecurity growing increasingly relevant, post-quantum cryptography is needed sooner rather than later. In this article we will explore the challenges that quantum technology will bring to our cyber environment, and how CyberDefence Advisory is preparing for this future.

Why cryptography is critical to cybersecurity

published by James Olsen. 09:22:03GMT+10 Monday, February 17

The world wide web is founded on transferring trillions of packets of data across the internet every day. Each packet of data exists in the open, available to potentially be read by millions or billions of people. As the old adage goes, you can never count on anything ever truly being deleted from the internet.

So if any data on the internet exists so openly, how can this data be protected? This is the critical question that cryptography exists to solve. By providing data not only with confidentiality, but also guarantees of who is sending it (integrity), cryptography provides the entire foundation of cybersecurity. In this article we will also explore how CyberDefence Advisory supports research and development in this critical field.

What are the most common causes, and risks, for a data breach?

published by James Olsen. 21:05:26GMT+10 Friday, February 14

Data breaches are almost a fact of life currently. In the 2023-24 financial year across Australia alone there were roughly 47 million instances of someone's data being leaked to the wider world. These are only those that are known about too. The Australian government is continuing to invest record amounts and update existing laws to change this, but organisations have to be proactive too if they wish to stay ahead of cybercrime.

That is why data breaches don't have to be a fact of life. In this article we will touch upon the changing legislative landscape, and the improving technologies and standards to protect you. We will also explain how CyberDefence Advisory can help protect your organisation. From preparing ISO 27001 certification to implementing the recommendations of the Australian Signal Directorate's Essential Eight, there is plenty that can be done to manage the causes and risks of data breaches.