181-190 of 330 results
Fact sheet: Show me the money: Tax reforms to encourage investment in startups
The Ideas Boom has arrived with the Federal Governments National Innovation and Science Agenda Central to the new agenda are a raft of tax and regulatory measures designed to encourage greater investment in startups to help them both get off the ground and to survive the valley of death with greater ...
OAIC concludes investigation of Australian Red Cross data breach
OAIC concludes investigation of Australian Red Cross data breach where a one-off human error by a third party provider's employee led to a massive data breach that hit the Australian Red Cross Blood Service ...
Blockchain reaction update - ASIC joins chorus on ICO regulation
While ASIC has published information on the issue of coins or tokens in initial coin offerings other regulators around the world have also been issuing guidance with some taking a much more restrictive approach Although Australia remains a relatively friendly regulatory environment for such ...
How to create a cyber resilient supply chain
What do the Australian Department of Defence Target Verizon and the Australian Red Cross Blood Service have in common They all suffered massive data breaches linked to a failure in their supply chain These breaches are a good reminder that with so much attention directed at securing your ...
On the international stage: Australia and the EU launch cyber security plans
In recent weeks, both Australia and the EU have unveiled their plans to address cyber security in an era of growing concern and uncertainty. On 13 September 2017, President of the European Commission, Jean-Claude Juncker, outlined the Union's intentions to intensify their efforts regarding cyber sec ...
Unexpected risks of the IoT revolution: Cyber security in medical devices
In late August 2017 the US Food and Drug Administration recalled 465000 Abbott Laboratories pacemakers due to cyber security vulnerabilities Although this was the first time that the FDA had recalled a medical device because of cyber concerns they have been alive to the significant risk that a cyber ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
Linklaters Insights: European Commission reaffirms tough stance on loyalty inducing rebates
After a two-and-a-half year investigation the European Commission has imposed a euro997 million fine on Qualcomm for illegally shutting out rivals from the market for LTE baseband chipsets using significant payments to an important customer Apple in return for exclusivity ...
One click from meltdown - cyber attacks on critical infrastructure
Security experts have been predicting for some time that as critical infrastructure networks become smarter more automated and more connected they will also become more vulnerable to cyber threats Reports last week of extensive attacks on critical infrastructure by hackers associated with the ...
Final APRA Guidance on Information Security (CPG 234) released – are you prepared?
APRA has released the updated final version of its Prudential Practice Guide, which gives crucial context about how it views cybersecurity threats. ...


