Australia Tech News - Page 8 of 27 - Techbest - Top Tech Reviews In Australia

How Australian Organisations Can Achieve the Perfect Equilibrium Between Accessibility and Security


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Finding the Right Equilibrium Between Access and Security for Australian Organisations

Quick Read

  • Forrester Research indicates that 80% of security incidents involve compromised or mishandled privileged accounts.
  • Ransomware continues to pose a major threat to organisations in Australia, with inadequate access controls identified as a key vulnerability.
  • The Australian Cyber Security Centre’s (ACSC) Essential Eight framework plays a crucial role in assisting organisations with access control and privileged access management.
  • Achieving a balance between security measures and user experience is vital to prevent employees from circumventing strict security protocols, which may result in data leaks.
  • Organisations ought to implement a policy-driven strategy for managing access exemptions, encompassing time-limited permissions and multi-factor authentication (MFA).
  • Comprehensive identity security strategies should incorporate various defensive layers, such as application control, user hardening, and privilege management.
Achieving Balance Between Access and Security for Australian Organisations

The Changing Cybersecurity Landscape in Australia

The cybersecurity environment in Australia is becoming increasingly intricate as time goes on. Ransomware stands out as a persistent and detrimental threat to both organisations and vital infrastructure. As noted by the Australian Cyber Security Centre (ACSC), ransomware incidents frequently exploit weaknesses in access management frameworks, underscoring the need for organisations to enhance oversight of privileged access.

Even a minor security lapse, such as an inappropriate granting of permissions to a foreign contractor or a poorly configured user account, can put an entire network at risk. This threat is intensified by the growing array of regulatory frameworks in Australia, including the Essential Eight developed by the ACSC to address cybersecurity vulnerabilities.

The Importance of the Essential Eight in Access Management

At the heart of the Essential Eight is the focus on overseeing access controls and administrative privileges. The Australian government has initiated the Protective Security Policy Framework, mandating organisations to “limit and monitor privileged system accesses.” These initiatives are designed to drastically lower the risk of cybercrime, particularly ransomware, by guaranteeing that only authorised personnel can access critical systems and sensitive data.

Nonetheless, implementing stringent access control policies can be a two-edged sword. While stricter environments may enhance security, they often lead to negative user experiences. Employees or contractors might seek to bypass these constraints, either consciously or inadvertently, leading to data being exposed to unauthorised external platforms.

Managing Access Exemptions Effectively

A vital aspect of maintaining an equilibrium between security and accessibility is how organisations manage access exemptions. While deviations from standard access protocols are occasionally necessary, they must be approached with caution to prevent the introduction of new security risks.

Assessing Exception Requests

When a request for an exception is submitted, organisations should evaluate both the authenticity and urgency of the request. Is it coming from a trusted high-level executive, or is it from an externally contracted individual with limited supervision? Understanding the context helps assess the associated risks of granting the exemption.

For instance, if temporary access to a sensitive system is requested by a contractor, it is essential to scrutinise the request thoroughly and consider if alternative solutions, such as granting restricted access with enhanced oversight, would be adequate.

Temporary Exemptions

A practical tactic is to provide temporary exemptions. By enforcing an expiration date on access permissions, organisations can mitigate the risk of exposure to vulnerabilities. If access is only required for a week, permissions should automatically lapse after that timeframe. However, this method presents its own challenges.

Some propose lifting all restrictions on an endpoint temporarily to facilitate operations, yet this tactic broadens the attack surface and contradicts the Essential Eight’s principles regarding limiting administrative privileges. A more balanced strategy would involve granting only necessary permissions while mandating multi-factor authentication (MFA) for any exception requests.

Policy-Based Exception Management

To minimise risks, organisations should embrace a policy-driven method of handling exceptions. Policies need to be adaptable enough to manage a range of scenarios, from urgent access requests to routine exceptions, while also being stringent enough to avert abuse. For example, protocols could stipulate that all exception requests go through a formal approval process with multiple stakeholders involved, ensuring that security remains a priority over convenience.

The Importance of User Experience in Security

While it’s common for organisations to heavily prioritise security, doing so at the detriment of user experience can lead to adverse outcomes. If employees find the security landscape excessively restrictive, they might resort to circumventing it altogether. This could result in the adoption of unauthorised cloud services, personal devices, or other third-party platforms that fall outside the organisation’s control or compliance measures.

Comprehensive Identity Security Strategy

To prevent this, organisations should implement a comprehensive identity security strategy that includes multiple layers of defence, such as application management, user application fortification, and administrative privilege oversight. By coordinating these measures effectively, the organisation can reap the benefits of digital transformation while avoiding unnecessary security vulnerabilities.

For example, integrating MFA with privilege management tools can ensure users access necessary systems only under secure conditions. Additionally, continuous monitoring and routine audits can assist in pinpointing potential vulnerabilities before they can be exploited.

Conclusion

As the cybersecurity landscape in Australia progresses, organisations must discover methods to harmonize security with accessibility. With the rise of ransomware and other threats, proper privileged access management has taken center stage. The Essential Eight and Protective Security Policy Framework provide a regulatory foundation, but organisations must proactively manage exemptions to ensure security does not compromise user experience.

By employing time-limited, policy-driven exemptions and integrating a robust identity security strategy, organisations can achieve the right balance between safeguarding their assets and allowing their workforce to stay productive.

Q&A

Q: What is the primary cybersecurity concern for Australian organisations?

A:

Currently, ransomware represents one of the most pressing threats for Australian businesses. It frequently exploits flaws in access management and privileged account controls, highlighting the necessity for organisations to strengthen their security protocols.

Q: In what ways does the Essential Eight framework assist with cybersecurity?

A:

The Essential Eight, formulated by the Australian Cyber Security Centre (ACSC), comprises a set of guidelines aimed at helping organisations alleviate security risks by concentrating on aspects such as application patching, restricting administrative privileges, and employing multi-factor authentication.

Q: Why is balancing security and user experience crucial?

A:

If security measures are overly stringent, users might attempt to bypass them, which may lead to insecure behaviours, such as using unapproved devices or services. Such actions could result in new vulnerabilities and expose the organisation to heightened risks.

Q: What are access exemptions, and why are they important?

A:

Access exemptions are temporary permissions enabled for users needing access to specific systems for a limited duration. While they are vital in certain situations, they should be managed judiciously to avert prolonged exposure to security threats.

Q: How can time-sensitive exemptions enhance security?

A:

Time-sensitive exemptions automatically terminate access after a specified duration, thereby lowering the chances of long-term vulnerabilities. This guarantees that permissions are not left active indefinitely, which could be misused by malicious entities.

Q: What significance does multi-factor authentication (MFA) hold in access management?

A:

MFA introduces an additional security layer by necessitating users to provide two or more verification factors to access a system. This complicates matters for attackers, even if they manage to obtain a password.

Q: How can organisations ensure the effectiveness of their access control policies?

A:

Organisations should periodically evaluate their access control policies, ensuring they align with industry best practices and regulatory requirements. Implementing continuous monitoring solutions and conducting regular security assessments can help identify potential vulnerabilities.

Presenting the Finalists for the Inaugural Benchmark Awards: Security


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Benchmark Awards: Honouring Security Excellence in Australian Organisations

The Australian cybersecurity environment is progressing swiftly, with organisations from various sectors enhancing their efforts to secure critical data and infrastructure. TechBest is excited to unveil the finalists for the first-ever Benchmark Awards: Security, highlighting the remarkable accomplishments of leaders in this domain. From education to healthcare, finance to government, these individuals and teams are leading Australia’s fight against cyber threats.

Quick Overview

  • More than 50 finalists have been revealed across different sectors, such as government, healthcare, retail, and telecommunications.
  • The awards will honour the successes of CISOs (Chief Information Security Officers) and CSOs (Chief Security Officers) for their outstanding cybersecurity initiatives.
  • Awards will be bestowed on October 16 at the Shangri-La Hotel in Sydney, during a gala dinner and conference event.
  • The gathering is supported by prominent cybersecurity firms like AUSCERT, Mimecast, NinjaOne, Skybox Security, and TeamViewer.
  • Finalists span a wide range of industries, including education, healthcare, governmental, financial services, energy, and the not-for-profit sector.

Awards to Honour Cybersecurity Excellence

Cybersecurity has transitioned from being solely an IT concern to a vital business requirement. Australian organisations are increasingly focusing on their cybersecurity plans, with leaders taking a key role in protecting essential assets. The TechBest Benchmark Awards: Security aims to acknowledge the contributions of these security professionals who are at the forefront of ensuring the safety of Australian businesses against evolving cyber threats.

Education Sector: Protecting Student Data

With the increase in remote education and cloud solutions, cybersecurity in the education sector has become critically important. The finalists in this area have instituted strong security protocols to secure sensitive student and research information from cyber intrusions.

  • Dan Maslin, Group CISO, Monash University
  • Derek Winter, CISO, University of NSW
  • Glenn Dickman, Director of Cyber Security, Griffith University
  • Jan Zeilinga, CISO, James Cook University
  • Shireen Syed, CISO, University of Newcastle
  • Vanessa Tsaccounis, CISO, University of Wollongong

Healthcare: Safeguarding Patient Data

Healthcare institutions are primary targets for cybercriminals due to the sensitive nature of patient information. The finalists in this segment have excelled in implementing advanced cybersecurity initiatives that uphold data privacy while promoting digital healthcare advancements.

  • Peter Croll, CISO, NSW Health
  • Mia Al-Sharif, CISO, Ramsay Healthcare
  • Marc Reinhardt, Director of Cyber Security & IT Risk, Icon Group
  • Nicole Neil, Information Security Director, Seer Medical
  • Vijay Narayan, CISO, Mercy Health

Not-For-Profit: Protecting Vulnerable Communities

The not-for-profit sector frequently navigates resource limitations, rendering it particularly susceptible to cyber threats. These finalists have surmounted these hurdles to create solid cybersecurity infrastructures that shield both their organisations and the communities they serve.

  • Doug Hammond, CISO, Uniting
  • Kat McCrabb, Digital Risk and Security Lead (CISO), Brisbane Catholic Education
  • Noel Toal, CIO, DPV Health
  • Ross Adam Anicete, Head of Cyber Security and Infrastructure, Fresh Hope Communities

Government: Protecting Public Infrastructure

In a climate where cyberattacks threaten essential services, public sector CISOs play an increasingly crucial role. The finalists in this segment have been vital in crafting resilient cybersecurity strategies that protect public infrastructure and services.

  • Andrew Stokes, Deputy CISO, Queensland Government Cyber Security Unit
  • David Griffiths, CISO, Northern Beaches Council
  • Gabriela Guiu-Sorsa, Principal Advisor, Information Security, Queensland Fire Department
  • Leigh Dixon, Director, Cyber Security, Department of the Premier and Cabinet Queensland
  • Roxanne Pashaei, CISO, Rural Fire Service
  • Shane Moffitt, Former Deputy CISO, Victorian Government
  • Travis Hawkins, Deputy CISO, Department of Agriculture and Fisheries (Queensland)

Finance and Professional Services: Securing Financial Assets

Financial organisations are among the most vulnerable to cybercriminal targets. The CISOs and security leaders in this field have been essential in protecting financial systems, customer information, and adherence to strict regulatory mandates.

  • Daniel Muchow, Head of Cyber Risk and Security, La Trobe Financial
  • Daniela Fernandez, Head of Information Security, PayPal Australia
  • David Geber, General Manager, Information Security & Risk, Rest Super
  • Edwin Kwan, Head of Cyber Security Advisory, Tyro Payments
  • Elaine Muir, Manager, Security Education and Awareness, IAG
  • Maria Milosavljevic, Group CISO, ANZ
  • Matt Duckworth, Director, IT Risk and Security – Asia Operations, MetLife
  • Sam Sala, Head of Cyber Security, RACV
  • Sandeep Taileng, Information Security Leader, State Trustees
  • Sunil Saale, CISO, MinterEllison
  • Dr Tim Nedyalkov, Technology Information Security Officer, Commonwealth Bank

Energy: Securing Critical Infrastructure

As energy companies embrace more digital technologies, the risk of cyberattacks on critical infrastructure has increased. The finalists in this category have proven excellence in fortifying energy grids, maintaining operational resilience, and defending against cyber threats.

  • Dune Sookloll, CISO, Horizon Power
  • Nathan Morelli, Head of Cyber Security and IT Resilience, SA Power Networks
  • Frances Bouzo, CISO, Ampol
  • Gijo Varghese, CISO, Endeavour Energy
  • Maryam Bechtel, CISO, AGL

Retail: Safeguarding E-Commerce and Customer Information

With the explosive growth of e-commerce, retail cybersecurity has become increasingly critical. The finalists within this category have adopted innovative strategies to safeguard customer data and ensure secure online transactions, keeping digital retail platforms safe and reliable.

  • Dieter Schutte, Head of Cyber Security, Super Retail Group
  • Mark Nix, CISO, Eagers Automotive
  • Meagan O’Mahony, Director of Security, The Iconic
  • Peter Sandilands, Information Security Manager, Pickles Auctions
  • Stephen Bennett, Group CISO, Domino’s Pizza

Telecommunications: Securing Australia’s Networks

Telecommunications form the foundation of modern connectivity, making the protection of these networks essential for national security. The finalists in this category have led cybersecurity initiatives aimed at safeguarding Australia’s telecommunications infrastructure from new cyber threats.

  • Charles Sterner, CISO, AARNet
  • Darren Kane, CSO, NBN Co
  • Peter James, Director, IT Operations, amaysim

Conclusion

The finalists for the inaugural TechBest Benchmark Awards: Security have showcased substantial leadership and innovation in the cybersecurity realm. These professionals have successfully managed the establishment of strong security programs across multiple industries, from education and healthcare to government and finance. The awards ceremony, scheduled for October 16 at the Shangri-La Hotel in Sydney, will honour these accomplishments and emphasize the vital role of cybersecurity in contemporary business and public infrastructure.

Q&A: Essential Information

Q: What are the TechBest Benchmark Awards: Security?

A:

The TechBest Benchmark Awards: Security aim to honour the contributions of Australian cybersecurity leaders, including CISOs and CSOs, who have executed effective and innovative cybersecurity initiatives across a variety of sectors.

Q: When and where will the awards take place?

A:

The awards will be presented during a gala dinner and

US FCC Chairman Advocates for Increased Competition to Counter Starlink’s Supremacy


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

FCC Chair Advocates for Enhanced Competition to Counter Starlink’s Dominance in Satellite Internet

Jessica Rosenworcel, the Chair of the United States Federal Communications Commission (FCC), has advocated for greater competition to address the supremacy of Elon Musk’s Starlink. As SpaceX’s satellite internet constellation continues to broaden its horizon and market share, Rosenworcel underscored the necessity of nurturing competition to promote innovation, reduce prices, and create a varied space economy.

Highlights

  • Starlink dominates nearly two-thirds of all operational satellites in orbit.
  • Elon Musk anticipates that Starlink will manage over 90% of global space-based internet traffic by the following year.
  • FCC Chair Jessica Rosenworcel emphasizes the need for heightened competition within the satellite internet sector.
  • The FCC is striving to invite new entrants by streamlining licensing and regulatory frameworks.
  • In 2022, the FCC withdrew Starlink’s US$885.5 million ($1.33 billion) subsidy earmarked for rural broadband due to unmet program criteria.

Starlink’s Expanding Influence in Satellite Internet

Since 2018, Elon Musk’s SpaceX has aggressively expanded its Starlink satellite network, placing over 7,000 satellites into orbit. Currently, Starlink controls nearly two-thirds of all active satellites in space. Musk has predicted that Starlink will represent over 90% of worldwide space-based internet traffic by the next year.

Starlink’s global footprint is unmatched, as it is the only high-speed internet service that covers the entire planet. Nevertheless, this extensive dominance raises alarms that it might suppress competition, potentially hindering innovation and increasing costs for consumers.

The FCC’s Appeal for Enhanced Competition

FCC Chair Jessica Rosenworcel has articulated the need for more competition in the satellite internet arena. During a recent conference, she pointed out that monopolistic structures do not enhance the economy and that the space sector should embrace the same competitive principles that apply to other communications industries.

Rosenworcel stated that wherever competition flourishes, consumers benefit from reduced prices and accelerated technological progress. She highlighted that space should be no exception to this rule.

FCC’s Initiatives to Foster New Entrants

To tackle Starlink’s dominance, the FCC is proactively working to facilitate the entry of new firms into the satellite internet marketplace. Rosenworcel explained that the Commission is enhancing its outreach to assist new entrants in navigating the FCC’s licensing processes and regulatory obligations.

This initiative, as part of the FCC’s wider strategy, aims to guarantee that the future of the space economy includes a broad array of players, resulting in innovations that serve both consumers and businesses.

Challenges Encountered by Starlink

Although Starlink has achieved significant progress in extending its satellite internet services, it has also encountered regulatory challenges. In August 2022, the FCC annulled a US$885.5 million ($1.33 billion) subsidy that had been allocated to Starlink for delivering rural broadband to over 642,000 households and businesses across 35 US states.

This decision was based on speed-test data indicating that Starlink was unable to fulfill the essential program requirements. Despite SpaceX’s contest of the ruling, the FCC maintained its position in 2022, adding to the regulatory obstacles that Starlink must overcome as it continues to expand.

Conclusion

With Starlink holding a substantial share of the satellite internet market, the FCC is advocating for increased competition to promote innovation, lower costs, and a more robust space economy. As part of this effort, the FCC is working to streamline regulatory processes to entice new companies into the satellite internet sector. Concurrently, Starlink is facing challenges in meeting specific program criteria, as evidenced by the loss of its rural broadband subsidy.

Q&A Section

Q: What concerns does the FCC have regarding Starlink’s dominance in the satellite internet market?

A:

The FCC is worried that Starlink’s supremacy could create a monopolistic environment, stifling competition, hindering innovation, and leading to increased prices for consumers. Chair Jessica Rosenworcel has pointed out that competition in any communications market usually results in improved services and reduced costs, and the satellite internet sector should adhere to this principle as well.

Q: How many satellites is Starlink currently operating in orbit?

A:

As of 2023, Starlink has placed around 7,000 satellites into orbit since 2018, managing nearly two-thirds of all active satellites in space. This swift expansion has enabled Starlink to provide high-speed internet services worldwide.

Q: What measures is the FCC implementing to enhance competition in the space economy?

A:

The FCC is streamlining its licensing processes and increasing its outreach to assist new businesses in understanding regulatory expectations. Through this approach, the FCC aims to lower entry barriers for newcomers in the satellite internet sector, fostering greater competition and innovation.

Q: Why was Starlink’s rural broadband subsidy revoked by the FCC?

A:

The FCC canceled Starlink’s US$885.5 million ($1.33 billion) rural broadband subsidy in 2022 after determining that the company had not met basic program conditions. Speed-test data suggested that Starlink was unable to provide the promised high-speed internet service to rural regions, which led to the withdrawal of the funding.

Q: What percentage of space-based internet traffic is Starlink expected to manage in the future?

A:

Elon Musk has indicated that Starlink is expected to handle over 90% of global space-based internet traffic by next year, highlighting the extent of Starlink’s dominance in the satellite internet market.

Q: In what ways might increased competition in the satellite internet market benefit consumers?

A:

Heightened competition in the satellite internet sector could result in lower prices, better services, and faster technological advancements. More participants in the market would stimulate innovation, providing consumers with improved options and potentially more affordable internet services.

Q: What is the global coverage capability of Starlink’s internet service?

A:

Starlink is currently the sole high-bandwidth internet service that offers coverage across the entire globe. Its vast satellite network allows it to deliver internet services to isolated and underserved areas that traditional ground-based infrastructure often cannot access.

Transurban Embraces AI for Enhanced Toll Collection


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AI-Enhanced Toll Collection: A More Intelligent Future

Transurban, a premier toll road operator in Australia, is leveraging the capabilities of artificial intelligence (AI) to optimize its toll collection systems. By incorporating AI into its current framework, Transurban seeks to tackle issues such as unrecognized or missed e-tags, thereby enhancing the experience for the millions of users who travel daily.

Transurban employs AI for improved toll collection

Artak Amirbekyan, Transurban

Brief Overview

  • Transurban is leveraging AI to enhance toll collection and minimize manual interventions.
  • AI evaluates vehicle data not captured by e-tags, achieving a 99% accuracy rate.
  • Machine learning technologies discern car make, model, and location via ALPR cameras.
  • AI decreases the necessity for human checks on challenging images by 40%.
  • Transurban manages about 2.5 million journeys daily throughout Australia.
  • AI is also utilized for road safety, detecting incidents, and managing tunnel ventilation.

The Necessity of AI in Toll Collection

With millions of users on Transurban’s toll routes every day, most depend on e-tags for seamless billing. However, not every tag is successfully detected due to technological errors, expired tags, or other reasons. These undetected instances lead to manual processing, which can be both lengthy and error-prone.

To remedy these problems, Transurban has launched an AI-enhanced “auto-correction” model that can analyze images captured by automatic license plate recognition (ALPR) cameras. This system discerns the vehicle’s make, plate number, and location, subsequently cross-referencing this information with customer data to accurately assign a driver and create an invoice. As a result, the company has diminished its dependence on human oversight by as much as 40%, significantly optimizing its operations.

Employing Amazon SageMaker for Greater Precision

The AI model crafted by Transurban operates on Amazon SageMaker, a machine learning platform that boasts a 99% accuracy level in vehicle identification. This degree of accuracy is vital to prevent billing mistakes that might incite customer dissatisfaction and complaints. The AI framework guarantees proper identification of even those vehicles with challenging-to-read license plates, thereby lowering the likelihood of erroneous billing.

Artak Amirbekyan, Transurban’s chief of data, AI, and machine learning, mentioned that the company handles approximately 2.5 million trips from customers each day. With such an extensive flow of traffic, the AI system has proven transformative, ensuring that the overwhelming majority of users receive accurate bills without needing manual action.

A Wider Vision for AI Implementation

The application of AI at Transurban extends beyond toll collection. The organization is incorporating AI across numerous aspects of its operations, such as road safety, incident detection, and tunnel ventilation. These initiatives aim to enhance the overall driving experience while boosting safety and operational efficiency on roadways.

Tanya Trott, Transurban’s CTO, disclosed that nearly 40% of the workforce is engaged in tech-centric roles, exemplifying the company’s dedication to adopting advanced technologies. “Though we rank among the safest road operators globally, there’s still more work ahead,” stated Trott. “Data is fundamental in enhancing our safety measures further.”

Utilizing AI for Road Safety and Incident Response

Beyond refining toll collection processes, Transurban is harnessing AI to monitor road safety and identify incidents instantaneously. By processing data from cameras and sensors strategically positioned along the roads, AI systems are capable of pinpointing potential dangers or accidents and notifying relevant authorities without delay. This proactive strategy considerably improves response times and reduces the likelihood of additional accidents.

AI’s Role in Tunnel Air Management

Tunnel safety represents another critical domain where AI is making a substantial difference. AI systems oversee air quality and ventilation within tunnels, making sure that conditions remain secure for all drivers. By automating these functions, Transurban can swiftly react to shifts in conditions, adjusting airflow to sustain safety benchmarks without needing human oversight.

Conclusion

Transurban’s deployment of AI within its toll collection and road safety strategies emphasizes the increasing significance of technology in infrastructure management. By utilizing AI to refine toll billing, bolster accuracy, and enhance safety initiatives, Transurban not only improves the customer experience but also establishes its status as a pioneer in intelligent road operations. The company’s ongoing commitment to AI and machine learning advancements signals continued progress in road safety and operational efficiency.

Q: In what ways does Transurban’s AI system enhance toll collection?

A:

The AI framework employs automatic license plate recognition (ALPR) cameras to detect vehicles missed by e-tags. This minimizes the requirement for human action by 40% while ensuring precise billing through data analysis and customer record verification.

Q: What technology underpins Transurban’s AI system?

A:

Transurban’s AI technology is founded on Amazon SageMaker, a machine learning platform known for its 99% accuracy rating in identifying vehicles via ALPR camera data.

Q: How many trips does Transurban manage on a daily basis?

A:

Transurban handles around 2.5 million customer journeys every day across Australia, with the majority billed automatically through its e-tag mechanism.

Q: Are there additional applications for AI at Transurban aside from toll collection?

A:

Yes, Transurban utilizes AI for road safety monitoring, incident analysis, and tunnel ventilation management. These AI technologies are instrumental in assessing road conditions, detecting accidents, and maintaining optimal air quality in tunnels, thereby heightening safety and operational efficiency on the roads.

Q: What is the accuracy rate of Transurban’s AI system for vehicle identification?

A:

As per Transurban, the AI technology achieves a 99% accuracy rate in identifying vehicles leveraging ALPR cameras. This exceptional accuracy is crucial in averting billing inaccuracies and customer grievances.

Q: How does AI enhance road safety at Transurban?

A:

Transurban’s AI systems oversee road safety and promptly detect incidents. By swiftly recognizing accidents or dangers, the AI can alert the appropriate authorities, thereby enhancing response times and mitigating the potential for further incidents.

Q: In what manner is AI applied in tunnel ventilation?

A:

AI systems continuously assess air quality and airflow in tunnels, making necessary adjustments to ensure safe environments for drivers. This automation facilitates quicker responses to changes within tunnels, guaranteeing safety without manual oversight.

“How Consistent Hardware Upkeep Can Enhance Your Cloud Strategy”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview: Essential Points

  • Consistent hardware maintenance is vital for optimising cloud strategies.
  • Reliable alliances with knowledgeable service providers facilitate seamless cloud migrations and ongoing management.
  • Proactive care of hardware can avert expensive downtimes and boost cloud efficacy.
  • Diversity and scalability in hardware are crucial for companies utilizing hybrid or multi-cloud setups.

Enhancing Your Cloud Approach through Regular Hardware Maintenance

As more businesses in Australia turn to cloud solutions, there’s a common belief that once the migration to the cloud is complete, concerns regarding physical hardware dissipate. Nevertheless, the truth is that hardware—whether located on-site or in data centres—remains fundamentally important in optimising cloud performance. In the context of today’s hybrid and multi-cloud frameworks, routine hardware maintenance is not only necessary for operational stability but also for maximising the return on cloud investments.

Tim McPherson, General Manager for Sales at Interactive for the Northern Region, highlights that hardware maintenance is essential for a thriving cloud strategy. With the growing variety in cloud infrastructure, organisations require adept partners who can deliver both preventive maintenance and support during migration timelines. This article clarifies why hardware maintenance is crucial and how it can amplify your cloud strategy.

Importance of Hardware in the Cloud

While cloud computing is often viewed as a means to lessen dependency on tangible hardware, cloud infrastructure substantially relies on the physical devices beneath. Regardless of whether you’re operating a private, public, or hybrid cloud architecture, servers, storage units, and network equipment are integral to your cloud setup. Failures or deterioration of these components can result in diminished performance, interruptions, or even data setbacks.

Overlooking hardware upkeep can also lead to rising expenses. Hardware malfunctions might cause unforeseen downtimes, which can be expensive for businesses that depend on continuous availability. Active maintenance guarantees that hardware stays in peak condition, significantly reducing the chances of unanticipated outages and performance slowdowns.

Boosting Cloud Efficacy through Partnerships

Selecting the right technology collaborators is vital for companies striving for optimal cloud operations. Firms like Interactive offer comprehensive hardware support services that go beyond simple break-fix approaches, ensuring active monitoring, repairs, and upgrades. With seasoned partners, organisations can confirm their hardware remains aligned with advancing cloud technologies, thus avoiding expensive disruptions during migration or upgrade processes.

Furthermore, capable partners assist companies in effectively scaling their cloud frameworks. Whether integrating new servers or increasing storage capacity, proper hardware configuration can notably influence cloud effectiveness. This is particularly important for businesses employing hybrid or multi-cloud systems, where a blend of on-site and cloud resources must function together seamlessly.

The Significance of Diversity in Cloud Infrastructure

Cloud infrastructure is becoming increasingly varied, with organisations implementing a combination of public and private clouds, along with on-premises equipment. This diversity empowers companies to create tailored solutions that fulfil their unique needs, but it also adds layers of complexity. To sustain performance across these diverse settings, businesses must ensure their hardware undergoes regular maintenance and updates.

Tim McPherson underscores the necessity of collaborating with knowledgeable partners to navigate this complexity. A business’s agility and responsiveness to shifts in the cloud domain hinge on having the appropriate hardware—and the right professionals to maintain it. Whether during migration phases or routine operations, seasoned partners are essential for ensuring harmonious operation between hardware and cloud systems.

Proactive Maintenance: Avoiding Downtime and Enhancing Performance

The repercussions of hardware malfunctions can be serious, particularly for companies relying on cloud services for essential operations. Downtime can result in lost revenue, negative customer experiences, and harm to a firm’s reputation. Proactive hardware maintenance helps sidestep these issues by detecting potential problems before they result in system failures.

Consistent hardware evaluations, performance diagnostics, and timely upgrades are all part of a strong maintenance plan. With these strategies in place, companies can ensure their hardware is not only dependable but also poised to support future growth in cloud utilisation. Proactive care also prolongs the lifespan of hardware, enabling businesses to maximise returns on their infrastructure investments.

Conclusion

As organisations persist in adopting cloud solutions, the significance of maintaining the hardware that supports these systems cannot be overlooked. Regular hardware management guarantees that cloud environments function smoothly, performance is optimised, and expensive downtimes are avoided. Collaborating with seasoned service providers such as Interactive assists businesses in navigating the difficulties of cloud infrastructure, ensuring scalability, reliability, and long-term success in the cloud. By emphasising proactive hardware management, organisations can optimise the value of their cloud strategies while mitigating risks linked to hardware issues.

Q&A: Commonly Asked Questions

Q: Why is hardware maintenance vital within a cloud setting?

A:

Despite the perception that cloud services eliminate the necessity for physical hardware, the cloud fundamentally relies on servers, storage, and networking devices to operate. Proper upkeep of this hardware is crucial to guarantee that cloud services remain accessible, swift, and reliable. Hardware failures in cloud setups can trigger downtimes, performance shortcomings, and elevated costs.

Q: How does hardware maintenance influence cloud migration?

A:

During cloud migration processes, businesses frequently use a combination of on-site hardware and cloud infrastructure. Ensuring that on-premises equipment is current and operating efficiently can help avoid interruptions and promote a smoother migration experience. Skilled partners can also assist in maintaining hardware compatibility with new cloud frameworks, lessening the likelihood of performance problems.

Q: What role do partners serve in hardware maintenance for cloud strategies?

A:

Technology partners furnish the expertise and resources required to sustain and enhance hardware in cloud environments. They deliver proactive maintenance, repairs, and upgrades, ensuring that hardware remains adaptable to changing cloud solutions. Companies like Interactive support organisations in managing the complexities of hybrid and multi-cloud systems, providing essential assistance during migrations and daily operations.

Q: Can consistent hardware maintenance lower costs?

A:

Indeed, regular hardware maintenance can prevent costly downtimes and diminish the necessity for urgent repairs or replacements. By proactively addressing potential issues, organisations can minimise disruptions to their cloud services and extend the lifespan of their hardware investments, ultimately reducing overall infrastructure expenses.

Q: How frequently should hardware maintenance occur?

A:

The frequency of hardware maintenance is contingent on the specific requirements of the organisation and the hardware in use. However, conducting regular assessments—at least quarterly—is advisable for most businesses. This involves performance testing, hardware evaluations, and updates to guarantee optimal cloud effectiveness and to identify possible issues early.


Enhancing cloud strategy through regular hardware maintenance

2025 Benchmark Awards Accepting Submissions Now!


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Entries for the 2025 TechBest Benchmark Awards Are Now Open!

For more than ten years, the TechBest Benchmark Awards have recognised the exceptional accomplishments of technology teams throughout Australia. These awards provide an avenue for organisations to achieve recognition for their dynamism, creativity, and the considerable benefits they offer to government, industry, and consumers.

Quick Overview

  • The entry for the 2025 TechBest Benchmark Awards is now live.
  • Award categories encompass federal, state, and local government initiatives, along with education, health, finance, and other domains.
  • The deadline for entries is Thursday, October 31, 2024, at 11:00 PM AEDT.
  • The award presentation will occur on March 27, 2025, at Doltone House, Hyde Park, Sydney.
  • One exceptional project will receive the title of Australian Technology Project of the Year.

Honouring Innovation and Excellence

The TechBest Benchmark Awards, which have been held for over a decade, remain a prime vehicle for identifying the noteworthy contributions of technology teams in diverse sectors within Australia. These awards not only recognise innovation but also highlight the tangible effects these projects have on businesses, government functions, and society at large.

Specifically, the awards showcase the transformative power of technology across various industries, addressing key challenges and fostering efficiency and growth. From government entities to major private sector players, the variety of past awardees depicts the extensive range of technological advancements occurring nationwide.

Previous Winners

The awards from last year exemplified the high standard of projects initiated in Australia. Distinguished winners included the Department of Fire and Emergency Services, the Australian Taxation Office (ATO), Monash University, Commonwealth Bank of Australia, and The Salvation Army Australia.

These entities were recognised for their visionary projects that exemplified both technological expertise and significant contributions to the community, industry, and government. A complete photo gallery from last year’s awards presentation can be viewed here.

Categories for the 2025 Awards

The 2025 TechBest Benchmark Awards will include a wide array of sectors, ensuring different industries and fields have a chance to present their prime works. The categories for this year’s awards comprise:

  • Best Federal Government Project
  • Best State Government Project
  • Best Local Government Project
  • Best Education Project
  • Best Health Project
  • Best Finance (and Professional Services) Project
  • Best Energy, Utilities, and Electricity Project
  • Best Primary Industries (Agriculture, Farming, Fishing, Forestry, and Mining) Project
  • Best Retail Project
  • Best Not for Profit Project
  • Best Telecommunications and Media Project

Additionally, one remarkable project will be recognised with the esteemed Australian Technology Project of the Year award, celebrating a leading initiative that exemplifies technological excellence in the nation.

Entry Deadline

The time for submissions is running out. Interested candidates must submit their entries by Thursday, October 31, 2024, at 11:00 PM AEDT. If you plan to participate, now is the opportune moment to prepare your submission.

To initiate your entry, click here.

Awards Ceremony

The victors of the 2025 TechBest Benchmark Awards will be honoured at a distinguished gala dinner and conference on March 27, 2025, at Doltone House, Hyde Park, Sydney. This gathering will unite industry leaders, innovators, and technologists from across Australia, offering an excellent opportunity for networking and celebrating technological accomplishments.

Entries for the 2025 TechBest Benchmark Awards are now open

Overview

The 2025 TechBest Benchmark Awards present a chance for Australian organisations to highlight their most innovative and influential technology initiatives. Spanning a broad range of sectors, the awards accentuate the role of technology in reshaping industries and solving pressing issues. As entries close on October 31, 2024, and the awards ceremony is set for March 27, 2025, it’s the perfect time to begin preparing your submission.

Commonly Asked Questions

Q: Who can enter the 2025 TechBest Benchmark Awards?

A:

The awards are available to organisations and technology teams in Australia from various sectors, including government, education, healthcare, finance, energy, and more. Each category is structured to accommodate a broad spectrum of projects, encouraging any organisation with a noteworthy technology initiative to apply.

Q: What is the deadline for submissions?

A:

The submission deadline is Thursday, October 31, 2024, at 11:00 PM AEDT. All entries must be submitted by this cut-off to be eligible for the awards.

Q: How are winners chosen?

A:

Winners are determined based on the innovation, impact, and value provided by their projects to the sector and community. A panel of industry experts will evaluate all submissions and select winners for each category, in addition to the overall Australian Technology Project of the Year.

Q: What does the Australian Technology Project of the Year award entail?

A:

The Australian Technology Project of the Year award is presented to an exceptional project that demonstrates outstanding innovation, execution, and impact. This award is considered the highest distinction at the TechBest Benchmark Awards.

Q: When and where will the awards presentation occur?

A:

The awards ceremony will take place on March 27, 2025, at Doltone House, Hyde Park, Sydney. The event will feature a gala dinner and a conference, gathering leading industry figures and innovators to celebrate the winners’ achievements.

Q: How can I submit my project for evaluation?

A:

You can commence your submission by clicking here. Ensure to complete all required fields and submit your entry by the deadline of October 31, 2024.

“Is Australia Prepared for Tesla Robotaxis? Here’s What the National Transport Commission Uncovered”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Is Australia Prepared for Tesla Robotaxis? Insights from the National Transport Commission

As Tesla accelerates its ambitious strategy to launch fully autonomous robotaxis by 2025, Australians find themselves questioning: Is our nation truly equipped for this technological advancement? The National Transport Commission (NTC) has provided its perspective, and while strides are being taken, there are unmistakable hurdles ahead. Here’s everything you should be aware of regarding Australia’s preparedness for Tesla robotaxis and the necessary steps for this visionary plan to materialize.

Quick Summary

  • Tesla intends to introduce fully autonomous robotaxis globally by 2025.
  • Australia’s legislative frameworks are undergoing updates but may not be finalized until 2026.
  • Differences in road regulations among Australian states present a major obstacle to deploying autonomous vehicles.
  • The NTC is currently evaluating feedback, including Tesla’s, to guide future policy development.
  • Tesla’s Full Self-Driving (FSD) program still needs human oversight, although upcoming versions might not require a driver.
  • With growing urgency, autonomous vehicles could lessen road deaths, yet regulation is struggling to keep pace with technology.

Tesla Robotaxis: What’s the Schedule?

Tesla’s Full Self-Driving (FSD) software has been under development for some time, and the company is now targeting an international launch by 2025. Elon Musk has indicated that a right-hand drive (RHD) version of Tesla’s robotaxi, designed to function without a steering wheel or pedals, is expected in Australia around the first or second quarter of 2025.

However, this ambitious schedule is contingent on regulatory approval. While Tesla has marketed its FSD software upgrade in Australia, the existing version still necessitates human supervision. To enable Tesla’s fully autonomous vehicles on Australian roads, considerable legislative changes will be imperative.

Australia’s Legislative Framework: Is 2026 Too Delayed?

In Australia, road regulations are managed at the state level, and the lack of uniformity between states complicates the establishment of national legislation for autonomous vehicles. The NTC is tasked with creating policies that could facilitate the rollout of autonomous vehicles such as Tesla’s robotaxis.

The NTC has been developing the Automated Vehicle Safety Law (AVSL), projected to be implemented by 2026. Nonetheless, many—including Tesla—contend that this timeline may be excessively slow. Tesla has signaled its willingness to collaborate with the NTC to expedite this process, emphasizing the potential life-saving advantages of autonomous vehicles.

The Importance of the NTC

The NTC plays a vital role in shaping the future of autonomous vehicles in Australia. The Commission is assessing input from various parties, including Tesla, to inform the creation of consistent national policies. However, the perceived lack of urgency from the NTC has raised alarms, particularly as Australia’s road fatality rates continue to rise.

The NTC has indicated that future progress reports will be shared on its Automated Vehicle Program page, but for the moment, the timeline remains uncertain.

Why Tesla? What About Other Autonomous Vehicle Manufacturers?

While organizations like Waymo, Cruise, and others are at the forefront of the global autonomous vehicle sector, Tesla stands alone in actively pursuing level 4 and 5 autonomous systems within Australia. Other companies operating in Australia primarily offer level 2 driver-assist systems that still demand significant human involvement.

This positions Tesla as the leader in Australia’s journey towards autonomous driving, but the success of this endeavor will largely rely on how swiftly legislation can progress in alignment with advancing technology.

The Safety Perspective: Autonomous Vehicles Could Save Lives

A key justification for autonomous vehicles is safety. Human operators are vulnerable to errors induced by fatigue, stress, distractions (such as mobile devices), alcohol, and drug use. Conversely, autonomous vehicles could entirely eradicate these risk factors. Advocates like Tesla argue that the sooner we can initiate the full deployment of autonomous systems, the more lives we could potentially save.

Despite safety initiatives, Australia’s road fatality statistics continue to escalate, underscoring the necessity for a more impactful solution. Autonomous vehicles could represent that solution, provided regulations can keep pace with technological progress.

Conclusion

Tesla’s robotaxi initiatives are advancing rapidly, with an international launch anticipated as soon as 2025. However, the legislative framework in Australia might not be in position until 2026, which could postpone the introduction of fully autonomous vehicles. The NTC is working on establishing national policies, yet concerns about the sluggish pace of regulatory adjustments linger. Meanwhile, Tesla continues to be the sole automaker actively championing level 4 and 5 autonomous systems in Australia. Given the potential to save lives, it is crucial to ensure legislation evolves in tandem with technology.

Q: What is Tesla’s schedule for introducing robotaxis in Australia?

A:

Tesla aims to deploy robotaxis internationally, including in Australia, by late Q1 or early Q2 of 2025. This timeline is dependent on obtaining regulatory approval from Australian authorities.

Q: What steps is the National Transport Commission (NTC) taking to prepare for autonomous vehicles?

A:

The NTC is formulating the Automated Vehicle Safety Law (AVSL) to establish a national framework for autonomous vehicles. However, this law is not anticipated to become effective until 2026, which could be too late to align with Tesla’s 2025 goal.

Q: Why is Tesla the primary focus when discussing autonomous vehicles in Australia?

A:

While other companies like Waymo and Cruise lead the charge in the global autonomous vehicle arena, Tesla is uniquely focused on advancing level 4 and 5 autonomy in Australia. Other manufacturers are primarily developing level 2 driver-assist systems, which still require human input.

Q: How could autonomous vehicles enhance road safety in Australia?

A:

Autonomous vehicles have the potential to drastically reduce road accidents linked to human error, such as fatigue, distractions, and impaired driving. By removing the human component, autonomous vehicles provide a safer, more dependable means of transportation.

Q: What are the main obstacles to Tesla’s robotaxi rollout in Australia?

A:

The key hurdles include inconsistent road regulations between Australian states and the sluggish pace of legislative development. Although Tesla’s technology might be prepared by 2025, the necessary regulatory frameworks may not be established until 2026.

“Oracle Stock Rises as AI Wave Fuels Skyrocketing Cloud Need”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Oracle’s AI-Fueled Cloud Strategy Sparks Remarkable Expansion

Once considered a late entrant to the cloud computing market, Oracle has recently witnessed its stock surge beyond 10 percent, driven by a robust initiative to embed artificial intelligence (AI) within its cloud offerings. This jump in share value is indicative of the increasing appetite for AI-driven products and Oracle’s capability to compete with industry titans such as Amazon and Microsoft.

Quick Read

  • Oracle’s stock increased by 10 percent owing to its strong AI incorporation in cloud services.
  • The company’s cloud revenue climbed 21 percent in Q1 2023, totaling US$5.6 billion (AU $8.4 billion).
  • Nvidia’s AI chips power Oracle’s cloud framework, acclaimed as top-notch in the market.
  • Oracle’s alliances with Amazon, Google, and Microsoft reinforce its multi-cloud strategy.
  • The firm’s share price has surged over 32 percent in 2023, significantly outperforming Microsoft and Amazon.
  • Oracle’s forward price-to-earnings ratio stands at 21.30, in comparison to Microsoft’s 29.81 and Amazon’s 31.50.

Cloud Revenue Enhanced by AI Implementation

Oracle’s recent achievements can be primarily linked to its prompt investments in AI innovations. In a sector largely ruled by strong competitors like Microsoft Azure and Amazon Web Services (AWS), Oracle has successfully established a notable presence by providing AI-augmented cloud solutions.

In its most recent financial disclosures, Oracle announced a 21 percent revenue increase from cloud services, amounting to US$5.6 billion (AU $8.4 billion). This advancement was pivotal in enabling the company to surpass overall revenue projections, culminating in a total of US$13.31 billion for the first quarter.

Analysts from Stifel have noted that Oracle is well-equipped for ongoing growth, attributed to its rising AI infrastructure bookings and strategic collaborations with other cloud entities. These strategic moves have assisted Oracle in reducing the disparity between it and cloud market leaders.

Nvidia-Backed AI Infrastructure

A significant contributor to Oracle’s success in the cloud domain is its partnership with Nvidia, a frontrunner in AI chip technology. Nvidia’s hardware is highly esteemed as the benchmark for AI processing, and Oracle’s utilization of these technologies has endowed it with a competitive advantage.

As AI and machine learning applications rapidly proliferate across diverse sectors, Oracle’s AI-enhanced cloud infrastructure is emerging as the preferred choice for companies aiming to streamline processes, improve data management, and elevate decision-making.

Strategic Cloud Collaborations

Oracle is also broadening its footprint through alliances with premier cloud entities. This week, the firm disclosed a partnership with Amazon Web Services (AWS), following a similar collaboration with Google Cloud earlier in June.

These alliances form part of Oracle’s multi-cloud approach, designed to ease the integration and management of data across various cloud platforms for businesses. Analysts from Bernstein suggest that this cooperation with the “big three” cloud providers (AWS, Google Cloud, and Microsoft Azure) is likely to further enhance Oracle’s cloud revenue and accelerate its growth trajectory.

Oracle Share Prices Surge Due to AI and Cloud Demand

Stock Performance and Rivalry in the Market

Should Oracle maintain its current momentum, the firm could achieve an additional US$39 billion in market capitalization. As of 2023, Oracle’s stock has escalated over 32 percent, significantly outpacing Microsoft and Amazon, which recorded gains of 8 percent and 15 percent, respectively.

Despite the rapid growth trajectory, Oracle’s stock remains relatively accessible for investors, with a forward price-to-earnings ratio of 21.30. This contrasts with Microsoft’s ratio of 29.81 and Amazon’s 31.50. This indicates that Oracle may serve as an appealing investment option for those looking to benefit from the AI surge without incurring high costs.

Summary

Oracle is generating significant buzz in the cloud computing landscape by merging innovative AI technology into its services. The company has successfully positioned itself as a compelling alternative to Microsoft and Amazon, bolstered by its partnerships with Nvidia and other cloud providers. With a 21 percent uptick in cloud revenue and a share price increase of 32 percent in 2023, Oracle’s prospects appear promising as it continues to harness the AI momentum. Investors and industry observers are encouraged to monitor Oracle closely as it strives to bridge the gap with market leaders.

Q&A

Q: What has driven the recent surge in Oracle’s share price?

A:

The surge in Oracle’s share price, which has exceeded 10 percent, can be attributed to its focused strategy to integrate AI within its cloud services—resulting in strong financial performance, particularly a 21 percent rise in cloud revenue during Q1 2023.

Q: How does Oracle’s cloud services stack up against those of Amazon and Microsoft?

A:

Oracle’s cloud offerings are seen as a more cost-effective solution compared to Microsoft Azure and Amazon Web Services (AWS). Furthermore, Oracle’s AI integration and partnerships with Nvidia provide a competitive advantage in delivering AI-driven cloud solutions.

Q: What significance does Nvidia hold in Oracle’s cloud framework?

A:

Nvidia supplies the hardware that supports Oracle’s AI infrastructure. Its AI chips are recognized as the benchmark in the industry, which enhances Oracle’s capacity to deliver superlative AI-oriented cloud services. This collaboration has become a key differentiator for Oracle’s cloud products.

Q: How have collaborations with other cloud providers influenced Oracle’s growth?

A:

Oracle has established collaborations with cloud powerhouses like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure. These partnerships facilitate multi-cloud solutions, making it simpler for businesses to manage their data across different platforms. This approach has greatly impacted Oracle’s growth in cloud revenue.

Q: How does Oracle’s stock performance in 2023 compare against Microsoft and Amazon?

A:

Oracle’s stock has surpassed both Microsoft and Amazon in terms of growth in 2023, achieving a 32 percent rise compared to Microsoft’s 8 percent and Amazon’s 15 percent. This progress is largely due to Oracle’s robust cloud service performance and effective AI integration.

Q: Is Oracle a viable investment choice in comparison to its competitors?

A:

With a forward price-to-earnings ratio that is lower than Microsoft and Amazon’s, Oracle presents itself as a more affordable investment opportunity. Increased price targets set by analysts reflect confidence in Oracle’s sustained growth, particularly in the realms of AI and cloud computing.

Q: What is the prognosis for Oracle’s cloud business moving forward?

A:

The outlook for Oracle’s cloud business is positive, driven by escalating demand for AI solutions and its strategic alliances with other cloud providers. Analysts at Stifel believe that Oracle’s AI infrastructure bookings will continue to rise, fueling ongoing revenue growth.

Nine’s Web App Shield Blocks 96 Million Malicious Requests Throughout the 2024 Olympics


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Concise Overview

  • Nine Entertainment thwarted 96 million harmful web requests during the 2024 Paris Olympics.
  • The organization employed Fastly’s web application firewall (WAF), capable of filtering 1.2 billion web and app requests each day.
  • Web traffic surged up to four times the usual rate during peak events like swimming.
  • Nine Entertainment relies on Fastly’s managed security service (MSS) for round-the-clock internet security, particularly during busy events.
  • The company is adopting new measures to stop AI bots from scraping content, especially from subscription-based brands like the Australian Financial Review.
  • AI scrapers, such as Perplexity, have demonstrated inaccuracies in content summarization, posing additional challenges for content security.

Nine Entertainment Thwarts 96 Million Malicious Requests During 2024 Olympics

Nine's web app protection blocked 96 million malicious requests during 2024 Olympics.

During the 2024 Paris Olympics, Nine Entertainment successfully blocked more than 96 million malicious web requests, attributing this accomplishment to its advanced web application firewall (WAF) supported by Fastly. This milestone marks a significant advancement in Nine’s persistent initiatives to protect its digital assets against heightened cyber threats, particularly during major events that attract substantial web traffic.

Managing Traffic Spikes During the Olympics

The 2024 Paris Olympics experienced a considerable increase in web traffic across Nine’s platforms such as the Australian Financial Review and Nine News, with some events, like swimming, experiencing traffic peaks reaching four times the normal levels. Andre Lackmann, Nine’s technology director of publishing and enterprise practices, noted that the company’s WAF processes roughly 1.2 billion web and app requests daily, but during the Olympics, the volume of requests surged dramatically.

This surge presented considerable challenges for Nine’s infrastructure; however, by utilizing Fastly’s WAF and Managed Security Service (MSS), the company effectively navigated these obstacles. About 70% of the traffic was managed by Nine’s Content Delivery Network (CDN), while the remaining 30% went through the WAF, with 1-2% being blocked due to harmful activity.

Utilization of Fastly’s Security Services

Nine has been a long-time adopter of Fastly’s security solutions, beginning trials in 2017. By 2023, Nine had completely transitioned from its outdated WAF to Fastly’s service. This transition enabled the media giant to streamline its internet security across its expanding digital properties.

Fastly’s managed security service (MSS) has played a vital role in assisting Nine with its cybersecurity management. Given the increasing intricacies of cyber threats, maintaining a 24/7 in-house team of security professionals proved challenging for Nine. Fastly’s MSS resolved this issue, delivering continuous, year-round protection while allowing Nine’s engineers to concentrate on other essential projects.

Lackmann recounted an incident during the 2024 State of Origin when the team identified unusual traffic trends. They quickly escalated the situation using Slack and consulted Fastly’s MSS team to address the suspicious activity, underscoring the importance of real-time monitoring and responsiveness in the current media environment.

Tackling AI Scrapers and Content Security

In addition to managing elevated web traffic, Nine is also contending with the rising threat from AI scrapers—bots designed to extract content for use in large language models like Perplexity. This is particularly alarming for Nine’s subscription-based publications, such as the Australian Financial Review, The Age, and the Sydney Morning Herald, as premium content serves as a key revenue source.

Lackmann pointed out that AI services are becoming increasingly adept at summarizing news articles, potentially affecting Nine’s revenue model. To mitigate this risk, Nine has revised its robots.txt file to restrict AI scrapers from accessing its content freely. While this step offers some level of protection, it is not entirely foolproof, prompting Nine to investigate more precise rate-limiting strategies to more effectively block scraping bots.

Interestingly, during testing, Lackmann discovered that Perplexity, one of the AI tools, generated inaccurate summaries of a news piece concerning pharmaceuticals in Australia. “It confidently discussed the article, but the details were largely incorrect, illustrating the limitations and risks associated with AI scrapers,” Lackmann remarked.

Conclusion

The achievement of Nine Entertainment in blocking 96 million malicious web requests during the 2024 Paris Olympics highlights the necessity of robust cybersecurity strategies, particularly during high-traffic events. With support from Fastly’s WAF and MSS, Nine adeptly managed the increase in web traffic while also addressing the emerging risk posed by AI content scrapers. As the media landscape evolves, Nine is proactively taking measures to safeguard its digital assets, particularly with regard to premium subscription content.

Q&A Session

Q: How does Nine cope with increased web traffic during major events?

A:

Nine utilizes Fastly’s web application firewall (WAF) and Content Delivery Network (CDN) to manage web traffic. The CDN handles around 70% of the traffic, while the WAF filters the remaining 30%, blocking 1-2% of potentially harmful requests.

Q: What function does Fastly’s Managed Security Service (MSS) fulfill for Nine?

A:

Fastly’s MSS delivers 24/7 internet security surveillance, enabling Nine to address complex cybersecurity requirements without the need for a full-time in-house security team. This is especially crucial during high-traffic events like the Olympics.

Q: How is Nine preventing AI scrapers from accessing its content?

A:

Nine has revised its robots.txt file to restrict AI scrapers, while also employing more sophisticated rate-limiting methods to specifically target bots. This approach is vital for subscription-based content on platforms like the Australian Financial Review.

Q: How accurate are AI scrapers such as Perplexity in content summarization?

A:

According to Lackmann’s evaluations, AI scrapers like Perplexity can lack accuracy. For instance, when summarizing a pharmaceutical article in Australia, it inaccurately referenced unrelated companies, demonstrating the current limitations of AI scraping technologies.

Q: Why is safeguarding content important for Nine’s brands?

A:

Content protection is essential since Nine’s subscription-based brands, like the Australian Financial Review, depend on premium content for revenue. Unauthorized scraping by AI bots could jeopardize this business model by offering free summaries of paywalled material.

Q: When did Nine start using Fastly’s services?

A:

Nine commenced trials of Fastly’s services in 2017 and fully transitioned from its previous WAF to Fastly’s platform in 2023, allowing Nine to unify its internet security efforts across its digital assets.

Q: How does Nine react to unusual web traffic activities?

A:

Nine utilizes platforms like Slack to coordinate between its internal teams and Fastly’s MSS team when abnormal traffic patterns are detected. This timely communication enables the company to respond promptly to potential dangers.

US Administration Suggests Compulsory Reporting for Advanced AI and Cloud Service Providers


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

US Government Advocates for Mandatory Reporting from Advanced AI and Cloud Providers

US Government Advocates for Mandatory Reporting from Advanced AI and Cloud Providers

The US Commerce Department has introduced a proposal for new regulations requiring comprehensive reporting from creators of advanced artificial intelligence (AI) and cloud computing systems. This effort seeks to ensure that these technologies are secure, reliable, and capable of resisting cyberattacks. Given the rising apprehensions about AI misuse, national security threats, and the prospect of technological disruptions, this initiative marks an important move toward governing the swiftly changing AI sector.

Quick Overview

  • The US Government is advocating for compulsory reporting from AI developers and cloud service providers.
  • The proposal involves reporting on cybersecurity practices and risk evaluations like red-teaming.
  • This initiative is a component of the Biden administration’s broader agenda to oversee AI and hinder misuse by hostile entities.
  • Developers of high-risk AI technologies will need to provide safety testing outcomes to the US Government.
  • The proposal addresses a lack of legislative progress in Congress related to AI oversight.
  • Concerns about AI’s ability to disrupt industries, elections, and create harmful technologies are driving these efforts.

In-Depth Reporting for AI and Cloud Service Providers

The Bureau of Industry and Security (BIS) within the US Commerce Department has suggested regulations that would necessitate AI developers and cloud providers to submit comprehensive reports on their development processes. These pioneering AI models, at the forefront of AI advancements, would require mandatory oversight to guarantee compliance with rigorous safety and reliability criteria.

This regulation applies not just to the development of AI models but also to the infrastructure that supports them, such as computing clusters. The goal is to ensure that these technologies are protected from cyber threats and do not end up in the wrong hands.

Red-Teaming for Risk Assessment

Under the proposed regulations, developers will also be obligated to execute and report on red-teaming activities. Red-teaming is a cybersecurity practice used for identifying vulnerabilities by simulating attacks to uncover weaknesses in AI systems. This concept originated during Cold War-era military simulations in the US, where the “red team” represented opposing forces. Today, it is commonly applied to evaluate the security of digital technologies.

The aim of red-teaming in AI research is to pinpoint risks that may lead to dangerous scenarios, such as utilizing AI to facilitate cyberattacks or gain access to dangerous materials, including chemical, biological, radiological, or nuclear weapons. By requiring these assessments, the US Government intends to thwart the potential for misuse by non-experts and foreign adversaries.

Generative AI: A Double-Edged Sword

Generative AI, capable of producing text, images, and videos in response to user prompts, is central to the regulatory focus. This form of AI generates both enthusiasm and anxiety. While it fosters creative and innovative applications across numerous sectors, it simultaneously raises alarms over job automation, interference in elections, and the risk of AI surpassing human control.

As AI capabilities grow, concerns persist regarding its potential to generate misinformation, deepfakes, and even autonomous weapons. The Biden administration’s proposal aims to ensure that AI continues to serve as a positive force rather than a source of chaos.

Executive Order on AI Safety

In October 2023, President Joe Biden ratified an executive order that compels AI system developers to share the outcomes of safety tests with the government prior to public deployment. This executive order is specifically aimed at AI systems that introduce risks to national security, public health, and the economy.

The data collected from these safety tests will be utilized to confirm that AI technologies are not only secure but also resilient against cyberattacks. The goal of the government is to reduce the likelihood of these technologies being exploited by foreign adversaries or rogue elements.

Regulatory Initiative Amid Legislative Stalemate

The push for obligatory AI reporting emerges during a period when legislative actions aiming to regulate AI in the US Congress have been stalled. With little significant legislative progress, the Biden administration has initiated various measures designed to uphold US leadership in AI technology while safeguarding against its misuse.

Earlier in 2023, the BIS undertook a preliminary survey of AI developers to gain insights into the field and identify potential threats. Moreover, the US government has been active in countering China’s use of US technologies to enhance its own AI capabilities, raising concerns related to global security.

Conclusion

The US Government’s initiative for obligatory reporting by advanced AI developers and cloud service providers marks a critical advance toward ensuring the safety and security of emerging technologies. By enforcing cybersecurity protocols, red-teaming evaluations, and the disclosure of safety testing results, the proposal seeks to mitigate the risks associated with AI amid climbing digital and geopolitical dangers.

Q: What is the primary objective of the suggested mandatory reporting for AI developers?

A: The primary objective is to guarantee that advanced AI models and cloud technologies comply with strict safety and cybersecurity standards. The reporting is designed to thwart misuse by foreign adversaries or non-state agents and to safeguard against possible cyber threats.

Q: What do red-teaming endeavors entail, and why are they pertinent to AI?

A: Red-teaming involves simulating assaults on AI systems to detect potential vulnerabilities. This enables developers to assess and address risks of AI abuse, such as aiding in cyberattacks or facilitating access to harmful technologies like chemical or radiological weapons.

Q: Why is generative AI a focus within these regulations?

A: Generative AI can generate realistic text, images, and videos, presenting both opportunities and challenges. The technology may disrupt sectors, influence elections, and spawn harmful content. The regulations strive to manage these risks while encouraging innovation.

Q: How does the executive order signed by President Biden in 2023 affect AI developers?

A: The executive order mandates that AI developers share safety test results with the US government before exposing high-risk AI systems to the public. This ensures that any safety issues are resolved prior to the technology’s widespread release.

Q: What hindrances are being encountered in enacting AI regulations through legislation?

A: Legislative efforts in US Congress regarding AI oversight have primarily stalled. In light of this, the Biden administration has resorted to regulatory actions, such as the Commerce Department’s proposal, to tackle the emerging risks linked to AI development.

Q: How does this proposal align with more extensive efforts to prevent China’s use of US technology?

A: The US government has taken measures to inhibit China from utilizing US-developed AI technologies for its own objectives. The proposal constitutes a part of a broader strategy to ensure that sensitive AI innovations do not end up with adversaries, which could threaten global security.