431-440 of 622 results
Protecting investment in biologic medicines - biological medicines, biosimilars and the challenges they pose
This series of articles is directed towards the part of biotech that is pharmaceutical rather than diagnostic or bioengineering technologies and in particular towards biologic medicines ...
One click from meltdown - cyber attacks on critical infrastructure
Security experts have been predicting for some time that as critical infrastructure networks become smarter more automated and more connected they will also become more vulnerable to cyber threats Reports last week of extensive attacks on critical infrastructure by hackers associated with the ...
CDR: What's next?
The release of the exposure draft of the CDR legislation marks the start of a tight turnaround in order for the legislation to be passed in March 2019 particularly as the details and associated instruments have yet to be released The CDR regime has been advertised as producing a wide range of ...
Show me the data! Introducing the Consumer Data Right
On 15 August the Federal Government released exposure draft legislation that if passed will establish an economy-wide consumer-directed data transfer system The latest sprint in a marathon of reviews reports and recommendations over the past few years that have called for the adoption of some form ...
How to create a cyber resilient supply chain
What do the Australian Department of Defence Target Verizon and the Australian Red Cross Blood Service have in common They all suffered massive data breaches linked to a failure in their supply chain These breaches are a good reminder that with so much attention directed at securing your ...
On the international stage: Australia and the EU launch cyber security plans
In recent weeks, both Australia and the EU have unveiled their plans to address cyber security in an era of growing concern and uncertainty. On 13 September 2017, President of the European Commission, Jean-Claude Juncker, outlined the Union's intentions to intensify their efforts regarding cyber sec ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
Unexpected risks of the IoT revolution: Cyber security in medical devices
In late August 2017 the US Food and Drug Administration recalled 465000 Abbott Laboratories pacemakers due to cyber security vulnerabilities Although this was the first time that the FDA had recalled a medical device because of cyber concerns they have been alive to the significant risk that a cyber ...
Clarification on the meaning of 'personal information'
The AAT has overturned the Grubb determination of the Commonwealth Privacy Commissioner and found that mobile network data from an individual's phone activity does not constitute 'personal information' under the Privacy Act ...
OAIC concludes investigation of Australian Red Cross data breach
OAIC concludes investigation of Australian Red Cross data breach where a one-off human error by a third party provider's employee led to a massive data breach that hit the Australian Red Cross Blood Service ...


