The Human Factor of Cyber Security
The recent successful cyber-attacks against Victorian regional hospitals highlights a growing concern in cyber security and technology circles.
Shannon Sedgwick | 08 Oct | Read more
The recent successful cyber-attacks against Victorian regional hospitals highlights a growing concern in cyber security and technology circles.
Shannon Sedgwick | 08 Oct | Read more
In the financial year to June 2018, transactions made on Australian cards rose by 5.1 percent over the previous year to more than $767 billion. Card fraud increased by 4.8 percent to $565 million.
Jason Dover, Kemp Technologies | 03 Apr | Read more
How much trust should the Australian people put into businesses when it comes to storing their data?
Serkan Cetin, One Identity | 20 Feb | Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks | 18 Dec | Read more
CIOs will be familiar with the dilemma. There are so many cloud options out there now – how do you know which is best for your business? How can you ensure you are delivering services that are both customer-centric and business-aligned?
Nathan Steiner | 08 Oct | Read more
The end of financial year is the point where many businesses refine their plans for the 12 months ahead. It’s also a great time to check the status of your IT security.
Michael Warnock | 25 Jun | Read more
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Manish Bahl | 26 Feb | Read more
Exciting technology developments from the completion of Elon Musk’s giant solar battery in South Australia to the highly anticipated iPhone X have marked 2017 as a calendar year for technology in Australia.
John Leiseboer | 01 Feb | Read more
Christmas may have come a few days early this past December for security advocates with the introduction of the Haven app, bringing with it a fair amount of excitement, criticism, and an excellent opportunity to explore some of the less often discussed aspects of working with open source.
During the past six months, the Carbon Black Threat Analysis Unit (TAU) analysed more than 1,000 ransomware samples, categorising them into 150 families, and found attackers are looking to make quick, easy money with unsophisticated malware, combined with sophisticated delivery methods.
Brian Baskin | 26 Sep | Read more
A company’s executives inevitably undertake a number of important leadership activities, making them both visible and accessible.
Darran Rolls | 20 Sep | Read more
One of the major aspects of ITAM (IT Asset Management) is SAM (Software Asset Management). SAM has seen a huge increase in interest and demand in its services recently.
Savaram Ravindra | 05 Sep | Read more
“This call will be recorded for quality, training and verification purposes” is a familiar phrase heard when seeking assistance from an airline, bank or any type of customer service situation. However, the question that comes to mind is under what circumstances these recorded logs are used?
Richard Cookes | 24 Jul | Read more
Attacks on critical national infrastructure such as power grids, communication networks and the banking sector have massive implications for any country.
Simon Howe | 14 Jul | Read more
It’s not surprising that data breaches are slowly making their way up the list of business executives’ biggest fears.
Richard Laycock | 12 Jun | Read more
In 2015, the Australian Government’s ‘Stay Smart Online’ initiative released a report discussing the cost of cybercrime to our small businesses.
Richard Laycock | 22 May | Read more
Information security professionals used to put all of their chips towards incident prevention.
Carbon Black | 27 Apr | Read more
Without consultation or warning, the Australian Government has decided to abolish the speciality skilled migration 457 visa system.
Andrew van der Stock | 27 Apr | Read more
It’s not a matter of if you’re going to be DDoS attacked, it’s a matter of when – many APAC organisations fail to understand the threat and quantify the risk – right-sizing and verifying the solution is a must.
Robin Schmitt | 10 Apr | Read more
Former CIA operative Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters.
David Frost | 04 Apr | Read more