Australia Wants Technology Businesses To Act On Extremism

Australian Prime Minister Malcolm Turnbull called on Internet companies to act more quickly to remove extremist content and to seek a solution to the “problem” of encrypted messages.

Speaking in London after the Group of 20 agreed to work with industry on finding a solution, Turnbull told Tech companies, “the ball is in your court”, as governments seek ways to prevent terrorists using the Internet to promote and plan their activities.

“Just as the owner of a locked bank vault cannot resist the order to hand over a document,” Internet companies shouldn’t be able to resist demands from law enforcement for encrypted information, Turnbull said in a speech recently. “We can’t allow ungoverned spaces,” he said. “The internet must remain free and secure, but it cannot be ungoverned.”

Turnbull, who earlier met with embattled UK Prime Minister Theresa May, echoed her call on Internet companies to crackdown on extremists who use their sites to recruit supporters and spread propaganda. While the web is a “transformative and democratic technology,” its freedoms shouldn’t override the need to prevent harm, he said.

“In the fight ahead there is no space for the mush of moral relativism, there is no justification for the murder of innocent children,” Turnbull said. “You must ensure that these dark places can be illuminated by the law so that freedoms cannot be stripped away by the communications your technologies make possible.”

Gulf News:

You Might Also Read:

Australia’s Sharp Turn To Information Warfare:

Australia Implements Mandatory Data Breach Reporting:

 

« Predicting Crime From Open Source Data
US Steps Up Its Cyberwar Capability »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.