The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data.
David Shephard |
04 Jul |
Read more
The upcoming roll-out of 5G across Australia presents many opportunities for the tech industry, but it also presents risks that will need to be faced and managed.
Sam Bocetta |
04 Jul |
Read more
The traditional focus of IT security has been on keeping out external threats, but the volume and frequency of security breaches caused by disgruntled, careless or negligent insiders has risen significantly in recent times.
David Shephard |
01 Jul |
Read more
Motivated by the promise of reduced operational costs, improved efficiency and better scalability, many organisations are shifting more of their IT infrastructure to cloud platforms.
Phil Kernick, CQR Consulting |
28 Jun |
Read more
Is it time for chief information security officers to step away from the front line and take strategic stock of their organisation’s security posture?
Mike Campfield |
28 Jun |
Read more
As consumers, we’re becoming more aware of the trail of data we leave behind as we go about out our daily lives. From social media sites to online shopping services, records of interactions are constantly being generated.
Peter O'Connor, Snowflake |
26 Jun |
Read more
WARNING! Spoilers for Endgame ahead.
Thomas LaRock |
24 Jun |
Read more
Remember the ransomware worm WannaCry back in 2017? After the carnage and financial damage it caused two years ago, the threat might be back again.
James Ley, Ivanti |
21 Jun |
Read more
Security is hard. There’s a lot of noise and pressure for businesses to get it right.
Tod Beardsley, Rapid7 |
21 Jun |
Read more
Every cybersecurity professional knows there’s no such thing as perfect security.
Mark Lukie, Barracuda Networks |
19 Jun |
Read more
The impact of a significant data breach can be exacerbated if your organisation isn’t ready to respond immediately once the alarm is raised.
Albert Kuo |
17 Jun |
Read more
It’s arguable that, in 2019, two types of enterprises exist: those that have implemented an enterprise-wide cloud transformation and those that will be implementing one very soon.
Budd Ilic |
17 Jun |
Read more
Phishing, exploits, malware, ransomware – it seems that every time we turn around there's another threat, technique, APT, or “super-bug” that we need to gear up and fight yet again.
Yoram Salinger |
17 Jun |
Read more
In the coming years, nation states’ intelligence services will combine forces with commercial organizations to launch a new wave of industrial espionage.
Steve Durbin |
17 Jun |
Read more
Identity information remains the holy grail of cybercriminals.
Eve Maler |
17 Jun |
Read more
Cyber security is one of the fastest growing industries around the world. As more and more companies move their businesses online, the potential for hackers to access sensitive data and use it for their own gains grows.
Damon Culbert |
13 Jun |
Read more
Australian organisations understand that, in order to remain competitive, they must accelerate digital efforts by improving their business agility.
Yannick Townsend |
08 Jun |
Read more
Cybersecurity is a highly-skilled field that heavily relies on human insight and can be extremely time intensive.
Yannick Townsend |
07 Jun |
Read more
As organisations recognise the need to educate their employees on security beyond a simple online training module, new challenges present themselves.
Bianca Wirth |
06 Jun |
Read more
Think manufacturing plants are unlikely to be prime targets for hackers and cyber-criminals, given the plenitude of other marks they have to choose from?
Mark Sinclair |
29 May |
Read more