Has your organisation fallen victim to a hacking attack or serious data breach? They’ve become unremarkable occurrences in the digital era, in Australia and around the world.
Simon Howe |
04 Jul |
Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler |
05 Apr |
Read more
Bring your own device (BYOD), where employees work from personal devices such as mobile phones and laptops, is quickly becoming the norm in today’s business environment.
Anurag Kahol, Bitglass |
15 Mar |
Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal |
15 Mar |
Read more
The new hybrid threat that has surfaced in the cyber world has helped cybercriminals in their pursuit of malicious attacks.
Rodney Joffe, Neustar |
07 Feb |
Read more
Like any elite sporting team, the success of an IT team’s breach prevention program relies on a strong defence.
Serkan Cetin, One Identity |
04 Feb |
Read more
It’s as sure a bet as any. Another day? Another cybersecurity breach
Rilind Elezaj |
30 Jan |
Read more
Staying abreast of the latest security tools, running more awareness training workshops for employees…the dawn of a new year is traditionally a time for turning over new leaves and resolving to do things differently and better.
Sumir Karayi |
11 Dec |
Read more
Exciting technology developments from the completion of Elon Musk’s giant solar battery in South Australia to the highly anticipated iPhone X have marked 2017 as a calendar year for technology in Australia.
John Leiseboer |
01 Feb |
Read more
Hackers are suffering from an image problem. Often thought of as anti-social geeks, hidden away in basements, the reality of modern hackers paints a different picture.
Graeme Pyper |
31 Oct |
Read more
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
Jon McGettigan |
30 Oct |
Read more
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings |
10 Oct |
Read more
We have just witnessed two significant ransomware / malware attacks in as many months that caused a lot of disruption to businesses globally. Some like TNT are still struggling to recover at the time of writing this whitepaper (10-07-2017).
Ashwin Pal |
13 Jul |
Read more
In 1959, an IBM employee by the name of Arthur Samuel programmed a computer to play checkers against him. Over time, the program was able to collect data, strategise and win a game all by itself. And thus, machine learning was born.
Bryan Gale |
29 May |
Read more
Those who run IT departments have what I like to call ‘the burden of knowledge’. They know what can go wrong and how wrong it can go, so they also know how important it is to put the right safeguards in place to prevent that from happening.
Robert Linsdell |
25 May |
Read more
In 2015, the Australian Government’s ‘Stay Smart Online’ initiative released a report discussing the cost of cybercrime to our small businesses.
Richard Laycock |
22 May |
Read more
The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure.
Lauren Horaist |
08 May |
Read more
Without consultation or warning, the Australian Government has decided to abolish the speciality skilled migration 457 visa system.
Andrew van der Stock |
27 Apr |
Read more
On 9th of January, SAP released its first set of security fixes (SAP Security Notes) for the year 2017.
Alexander Polyakov |
23 Jan |
Read more
Yesterday, the federal court handed down its decision on a thorny and controversial legal dispute between Telstra, the federal privacy commissioner and former technology journalist Ben Grubb over... I was about to write “his” metadata, but I can’t. The court has deemed that it’s not his or even about him.
Andrew Colley |
20 Jan |
Read more