Women in Security Conference & Awards: Photo Booth
Check out the beautiful & crazy pictures from the 3rd of September 2019 Women in Security Conference & Awards Ceremony.
05 Sep | View galleries
Check out the beautiful & crazy pictures from the 3rd of September 2019 Women in Security Conference & Awards Ceremony.
05 Sep | View galleries
Quantum decryption means the data you encrypt today will be compromised within a decade.
14 May | View galleries
As users what we want is to share more and have more privacy. It is through this prisoner dilemma that over this weekend Digi.me, ID Exchange and Alibaba Cloud joined forces to bring the power of personal data and private sharing to communities in regional NSW by delivering the digi.spark hackathon hosted at UTS as part of New South Wales Spark Festival.
28 Oct | View galleries
ZertoCON 2017 - The epicenter of the Business Continuity and IT Resilience world — in the hub of technology, culture and history that is Australia. It’s where BC/DR and hybrid cloud strategists meet and greet, collaborate and congregate, participate and party!
07 Aug | View galleries
And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.
23 Jun | View galleries
Innovation Day
17 Mar | View galleries
Anticipate 2016
29 Nov | View galleries
Security is no fiction
23 Sep | View galleries
Some of the most highly recommended hacking competitions that will get your name and skills noticed by the right people
26 Apr | View galleries
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
These 10 threats, bugs, and vulnerabilities serve as reminders that computer security goes well beyond the PC.
06 Oct | View galleries
Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
08 Jul | View galleries
Level 3’s research report analyses botnet activity around the world
19 Jun | View galleries
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
12 Jun | View galleries
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
27 May | View galleries
The experts weigh in on their top picks for protecting enterprise networks.
20 May | View galleries
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
12 May | View galleries
The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.
12 May | View galleries
The world’s largest security show is operating under a booth babe ban, leaving exhibitors to stretch their imaginations to get more visitors to stop by.
24 Apr | View galleries
Common Phishing techniques were less effective last year, so criminals changed their game in order to adapt
23 Apr | View galleries