Blog2023-05-25T03:05:57+10:00

Blog

Future-Proofing Access Control: XACML NG

By |

he OASIS committee has unveiled XACML Next Generation, a major leap for Attribute-Based Access Control. With native JSON/YAML, a flattened policy model, shared variables and developer-friendly identifiers, the new spec brings policy-as-code to modern CI/CD pipelines and cuts authoring effort for security teams.

Zero Trust Requires a Culture Shift – Not Just New Tech

By |

Zero Trust Requires a Culture Shift – Not Just New Tech The mantra "never trust, always verify" defines Zero Trust security, but achieving it takes more than deploying new tools. Many organizations invest in strong authentication, identity management, and network controls, only [...]

An Ounce of Prevention is Worth a Pound of Cure

By |

An Ounce of Prevention is Worth a Pound of Cure I used to hear this a lot growing up. But being the kid that I was, I didn’t really understand it’s meaning until I became an adult.  Ask yourself about issues that [...]

Risk: The Good, The Bad And The Ugly

By |

Risk: The Good, The Bad, And The Ugly The world is simply riddled with danger and mystery.  On the one hand, it can be fun and exhilarating. Taking your first climb, starting a new job, or changing careers.  All have fun [...]

  • Natural disasters pave the way for security risks

Natural Disasters and Global Outbreaks Bring Security Risks

By |

Natural Disasters and Global Outbreaks Bring Security Risks Natural disasters and global outbreaks, every year we see more of them.  But, this blog isn’t about climate change, science, health, or whether you believe in any of it.  Nope, today we’re focusing [...]

Facilitating Machinery-of-Government Changes

By |

Facilitating Machinery-of-Government Changes A recent federal election in my home country has reminded me of the disruption and work load on IT resources that can arise from organizational changes in governments and in complex enterprises. Inevitably a change in government leads [...]

Passwords Must Die!

By |

Passwords Must Die! Identity is a core component of cybersecurity, and as such I tend to pay attention to security breaches and the various exploits that underlie them. The picture is not pretty. Just considering the top 20 breaches in 2018, [...]

Go to Top