Saturday, March 6, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Former PM Turnbull suggests Australia boosts its cyber capability by buying local

August 19, 2020
in Internet Security
Former PM Turnbull suggests Australia boosts its cyber capability by buying local
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Former Prime Minister Malcolm Turnbull

You might also like

These two unusual versions of ransomware tell us a lot about how attacks are evolving

Microsoft: We’ve found three more pieces of malware used by the SolarWinds attackers

Zigbee inside the Mars Perseverance Mission and your smart home


Screenshot: Asha Barbaschow/ZDNet

Former Prime Minister Malcolm Turnbull has said there’s an opportunity to boost Australian talent, if government and large businesses alike moved away from the big end of tech town when procuring services.

“There’s clearly a big opportunity for innovation and we have outstanding cybersecurity professionals in Australia … we should be developing a world-leading cybersecurity industry,” Turnbull said on Wednesday. “The stronger your cybersecurity industry is in Australia, the better your cybersecurity will be.”

He said one of Australia’s biggest weaknesses is a lack of confidence in its own technological skills and a failure on the part of government “despite encouragement from politicians like myself to invest in and with Australian companies”.

“This is where governments I think often slip up — governments and big companies feel comfortable dealing with other big companies, often big systems integrators, foreign-owned. You’ve got to develop a culture where you are prepared to engage with, testbed, try out, do proof of concepts with smaller, younger, Australian companies,” he said.

The country’s 29th Prime Minister spoke alongside Alastair MacGibbon, who prior to heading up his own Australian cybersecurity megamix, CyberCX, was Turnbull’s special advisor on cyber.

Both Turnbull and MacGibbon in 2016 were faced with the failure of tech kit procured from IBM by the Australian Bureau of Statistics (ABS). On Census night, ABS experienced a series of small denial-of-service (DDoS) attacks, suffered a hardware router failure, and baulked at a false positive report of data being exfiltrated, which resulted in the Census website being shut down and citizens unable to complete their online submissions.

“That was a complete failure by IBM … whose face did all the egg end up on? It ended up on mine as the prime minister,” Turnbull said. “That was a classic case of an Australian agency … thinking that if they go with IBM, everything will be all right. You know, no one got fired for buying IBM and insert name of any other one of these big companies.”

See also: Australian government is currently juggling 62 high-cost IT projects

He said it speaks to not having enough technical skills inside government, and also “just being complacent about the big foreign companies”.

“We need to have more confidence in our own capabilities,” he added.

Acknowledging the need for more female representation in the cyber field, he also said anecdotally if the men in cybersecurity were more “congenial”, more women would get involved.

“There is a theory, I honestly — I’m not warranting this — but there is a theory that if the men were more sort of congenial there’d be more women doing cyber subjects. I don’t know. I think it’s a commentary rather than the solution,” he said.

Must read: Revisiting the conversation about tech diversity and inclusion in Australia

Touching on the federal government’s newly released 2020 Cyber Security Strategy, and the level to which government should be involved with the cybersecurity of businesses, Turnbull said he was hesitant to get behind any legislative direction to govern board responsibilities.

“One thing that could be useful is to require companies to formally address it in their annual report,” he said, accepting that such an approach is more of a “box ticking” exercise than a valid metric.

“That is the problem, because with self-regulation, the only way to look at this is that you can’t — the government’s not in a position to do a security audit on every company in Australia. So the only thing you can do is keep talking about it and keep raising awareness of it.”

“What would make a difference was if somebody got sued for not doing a good enough job on their cybersecurity …. and companies need to be very careful about that because if you’re not paying attention to it and your customers incur, also your company incurs, a loss, you might find yourself at the wrong end of a shareholder action.”

End-to-end encryption, Australia vs the US

While the former PM covered 5G and the banning of Huawei, Chelsea Manning and Edward Snowden, and Australia’s relationship with the overseas-based monarchy, he also touched on the subtle differences between Australia and the United States where end-to-end encryption is concerned.

“The arguments about end-to-end encryption are very cogent ones, because if you give, or if you say to WhatsApp or Signal or whatever, ‘you must have a backdoor key to allow lawful interception’, then the fact that that backdoor key exists, means that somebody else sees a vulnerability,” he said.

“Therein lies the risk.”

But further, Turnbull said the “cultural scene” where end-to-end encryption is concerned, differs in Australia to the likes of the US.

“My sense is Australians generally think the government is trying to do the right thing … they sort of feel the government, by and large, has tried to do the right thing. You know, run by stumblebums and incompetence at any given time,” he said.

“But in America, there is both on the right and the left, a really extreme libertarian tendency which sees the government as the enemy.”

He said this culminates in Silicon Valley as a determination to maintain end-to-end encryption.

“It’s quite ideological and baked into it today. It’s baked into their DNA and it’s connected with things like the second amendment and the right to bear arms,” Turnbull said. “It’s a very different mindset.”

RELATED COVERAGE

Credit: Zdnet

Previous Post

Xbox Series X Gets Details On Ray Tracing, Machine Learning, And More In Technical Deep Dive

Next Post

Biggest Challenges to B2B Brand-Building

Related Posts

These two unusual versions of ransomware tell us a lot about how attacks are evolving
Internet Security

These two unusual versions of ransomware tell us a lot about how attacks are evolving

March 6, 2021
Microsoft: We’ve found three more pieces of malware used by the SolarWinds attackers
Internet Security

Microsoft: We’ve found three more pieces of malware used by the SolarWinds attackers

March 6, 2021
Zigbee inside the Mars Perseverance Mission and your smart home
Internet Security

Zigbee inside the Mars Perseverance Mission and your smart home

March 6, 2021
FTC joins 38 states in takedown of massive charity robocall operation
Internet Security

FTC joins 38 states in takedown of massive charity robocall operation

March 5, 2021
Accellion zero-day claims a new victim in cybersecurity company Qualys
Internet Security

Accellion zero-day claims a new victim in cybersecurity company Qualys

March 5, 2021
Next Post
Biggest Challenges to B2B Brand-Building

Biggest Challenges to B2B Brand-Building

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Revolution by Artificial Intelligence, Machine Learning and Deep Learning in the healthcare industry
Machine Learning

Revolution by Artificial Intelligence, Machine Learning and Deep Learning in the healthcare industry

March 6, 2021
Deploy AI models -Part 3 using Flask and Json | by RAVI SHEKHAR TIWARI | Feb, 2021
Neural Networks

Deploy AI models -Part 3 using Flask and Json | by RAVI SHEKHAR TIWARI | Feb, 2021

March 6, 2021
These two unusual versions of ransomware tell us a lot about how attacks are evolving
Internet Security

These two unusual versions of ransomware tell us a lot about how attacks are evolving

March 6, 2021
Researchers Find 3 New Malware Strains Used by SolarWinds Hackers
Internet Privacy

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers

March 6, 2021
Analysis: The increasing scope of UK cryptocurrency regulation
Blockchain

Analysis: The increasing scope of UK cryptocurrency regulation

March 6, 2021
Will AI Replace Lawyers & Other Myths: Legal AI Mythbusters | Onit
Machine Learning

Will AI Replace Lawyers & Other Myths: Legal AI Mythbusters | Onit

March 6, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Revolution by Artificial Intelligence, Machine Learning and Deep Learning in the healthcare industry March 6, 2021
  • Deploy AI models -Part 3 using Flask and Json | by RAVI SHEKHAR TIWARI | Feb, 2021 March 6, 2021
  • These two unusual versions of ransomware tell us a lot about how attacks are evolving March 6, 2021
  • Researchers Find 3 New Malware Strains Used by SolarWinds Hackers March 6, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates