Competition is tough in the retail industry, including online where Small and Medium Enterprises (SME) effectively compete with large retail corporations. Customer Identity and Access Management (CIAM) can make a business competitive difference. Continue reading “Online Retail: more reasons to a better CIAM”
What would you do about private digital communication services if you were a leading political figure? How would you balance the priorities of privacy to best foster the development of your nation’s digital economy (relying on citizens and businesses digital trust) and the importance of counter-terrorism activities through digital surveillance? Continue reading “Counter-terrorism digital surveillance vs privacy from a politician point of view”
What would you want in exchange for foregoing your privacy and being monitored online: your every online move, all the sites and the apps you go to and for how long? Continue reading “Join a digital big brother program?”
I recently had the privilege of hosting a series of think tank sessions in Melbourne and in Sydney for the occasion of the FST Future of Security events in March, which Pirean was a sponsor of. The subject of the discussion was Consumer Digital Identity Management. The think tank aimed at addressing the boosting of online services adoption with efficient and attractive consumer identity management practices. The following questions provided a starting point to the group discussions:
IAM Feeling Good?
I switched banks years ago. My former bank’s financial services and benefits were average when compared to other banks, but something in particular triggered my decision to switch. I had developed a bad online user experience, and especially a bad feeling about Identity and Access Management (IAM). Continue reading “The feeling of digital identity management”
This is a sad day for technology. I love it when technology enables progress and efficiency in business and society. It saddens me when progress is stopped over security fears. I can certainly appreciate the risk management logic with e-voting, especially in times of suspected elections influence through hacking. However, I wonder whether the below case is more a question of a poor risk management practice causing a setback to progress. Continue reading “A vote of no-confidence in e-voting”
Australian politicians use Wickr and WhatsApp
Encrypted Political Turmoil, is a post I published in October 2016 reporting on the increasing use and popularity of secure communication apps, such as Wickr and WhatsApp, among leading Australian political figures including the Prime Minister. Continue reading “BYOS, Secure Communication for Hack-Fearing Politicians & others”
In a recent post, The Australian Cyber Risk Insouciance, I commented on an article from the Australian Financial Review (AFR), which reported that the Australian Government would not understand the cyber risks faced by the nation. They would not spend enough on cyber security to manage the risks adequately. They would then consequently expose the country to an unacceptable level of risk. The AFR article quoted some experts urging the Australian Government to spend more on cyber security. I concluded the post with 6 follow-on questions. The first question was “How much is the Australian Government currently spending on managing the nation cyber risk?”, which I have researched and report on below. Continue reading “How much is the Australian Government Spending on Cyber Security?”
Australia would be cyber risk insouciante, or carefree. They are spending $50bn on French submarines to better deal with Indo-Pacific military and maritime geopolitical risks, but they would not be spending enough to deal “properly” with cyber security risks. They would not understand cyber risks enough to prioritise them appropriately for the sake of the nation. Instead, the Australian Government would supposedly expose the nation to foreign state threats and “Cyber Pearl Harbour” risks as severe as “government overthrowing”. To fix the problem, Australia should reportedly “spend more” on cyber security.