Latest Blog.
Partnering to secure the cloud: Macquarie Cloud Services and Trend Micro.
|When it comes to Cloud design and implementation, security isn’t a question. It’s the question. It’s hard. And getting harder. Last year, over 31% of Australian organisations were breached0 and 75% lost data1. New mandatory breach reporting leg...
4 Reasons to Make Time for Macquarie Cloud Services at Gartner IOMDC Summit
|The Gartner IT Infrastructure, Operations Management & Data Centre Summit (IOMDC) is a premier gathering for senior IT and business leaders. It offers a depth and breadth of infrastructure and operations topic coverage that you otherwise can’t find...
Defence-In-Depth Cloud Security. Because part of a solution is no solution at all.
|In an era of mandatory breach reporting, cloud security challenges are growing. But budgets are not. The answer for many is to sweat their assets in Colocation Data Centres to free time, money and t...
Mandatory Breach Reporting. What's Changed and How You'll Know You're Ready.
|Data matters. Where it lives. How it’s managed. And how it’s secured. Yet last year, over 31% of Australian organisation were breached1. So how will you know when you’re ready? New Mandatory Breach Reporting obligations now apply for organisati...
Critical Intel, AMD and ARM Processor Vulnerability Response
|On the 4th of January 2018, details of two critical hardware vulnerabilities Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) emerged that impact the majority of computers running Intel Processors (Spectre and Meltdown), AMD and A...
Don’t Forget The Basics of Network Security (Part 2)
|In an earlier article, we looked at network security basics and how we can borrow guidance from the PCI Data Security Standard to make sure our firewall rules are documented and reviewed on a regular basis. This articl...
Don’t Forget the Basics of Network Security (Part 1)
|It seems every week you read a story about unsecured databases being exposed on the Internet, information being held for ransom, or even children’s teddy bears being attacked without their owner’s knowledge. While ...
Researchers create first practical attack on SHA-1
|TL;DR Researchers create first practical attack on SHA-1. If you use SHA-1, start moving to SHA-256/SHA-3. What is SHA-1? The Secure Hash Algorithm 1 (SHA-1) was created by the NSA and first published in 1995 as an improvement on the previously popu...
People Power - Macquarie Technology Group Unveils New Brand
|Embargoed 12.01am Thursday 28 July Macquarie Technology Group today unveiled its new brand, reflecting the evolution and strengths of the business. “This is not simply a fresh coat of paint – far from it,” Chief Executive David Tudehope said. ...