IT and cybersecurity operations have traditionally been siloed within businesses, often due to management decisions to break down overarching goals and assign smaller actions to different parts of the company.
James Ley, Ivanti |
09 Apr |
Read more
We just passed the ten-year anniversary of the 2008 recession, which rocked economies around the world. The culprit? In large part, the sub-prime mortgage crisis and the bankruptcy of Lehman Brothers.
Carlo Minassian |
08 Apr |
Read more
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint |
08 Apr |
Read more
The Information Commissioner’s quarterly reports under the Notifiable Data Breaches scheme makes for some sobering reading - as do the results from recent research conducted by Brennan IT.
Stephen Sims |
05 Apr |
Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler |
05 Apr |
Read more
In Ridley Scott’s 1982 sci-fi film Blade Runner, the “future” is set in 2019. In this version, the grey skies are littered with flying cars called “spinners”.
Ashley Stevenson, ForgeRock |
04 Apr |
Read more
What is more valuable: all of Coke’s factories around the world or the brand itself? If you chose the latter, you’d be correct.
Robert Malkin |
03 Apr |
Read more
A growing number of organisations are making strategic choices to avoid relying too heavily upon any single cloud service provider. In other words, they are pursuing multi-cloud strategies.
David Shephard |
03 Apr |
Read more
In the financial year to June 2018, transactions made on Australian cards rose by 5.1 percent over the previous year to more than $767 billion. Card fraud increased by 4.8 percent to $565 million.
Jason Dover, Kemp Technologies |
03 Apr |
Read more
Managing cyber-security in a multi-cloud environment comes with its own suite of organisational challenges.
Peter O'Connor, Snowflake |
02 Apr |
Read more
According to recent research by KPMG, almost half of all local councils in Australia are planning to implement smart city strategies
Ian Yip |
25 Mar |
Read more
Cyberthreats have never been more widespread, persistent, and potentially impactful as they are now, and each attack has the potential to bring an organisation to its knees.
Peter Fuller |
25 Mar |
Read more
More often than not, we simply assume that we have nothing worth stealing, so why should anyone take the time to try and hack us?
Rami Sass |
25 Mar |
Read more
Bring your own device (BYOD), where employees work from personal devices such as mobile phones and laptops, is quickly becoming the norm in today’s business environment.
Anurag Kahol, Bitglass |
15 Mar |
Read more
Businesses around the world have quickly embraced cloud technology as a critical solution to tackle operational complexities.
Michael Chetner, Zoom |
15 Mar |
Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal |
15 Mar |
Read more
Trust is a fickle concept in IT security. We trust that our applications are secure up until that trust is violated — like after a vulnerability is exposed or after an outage or breach.
George Tsoukas, Avi Networks |
15 Mar |
Read more
Failure has always been baked into the DNA of most successful cybersecurity awareness training programs.
Garrett O’Hara |
11 Mar |
Read more
The reality is that traditional development methods lack the agility needed to keep up with modern security needs. So how do businesses keep their security processes aligned? Enter: DevSecOps.
Yannick Townsend |
11 Mar |
Read more
Online burglars are just as devious as those in the flesh, if not more. They both have a goal and an understanding of how to reach it, irrespective of how much ingenuity and effort is required.
David Piggott |
11 Mar |
Read more