IT and cybersecurity operations have traditionally been siloed within businesses, often due to management decisions to break down overarching goals and assign smaller actions to different parts of the company.
James Ley, Ivanti |
09 Apr |
Read more
We just passed the ten-year anniversary of the 2008 recession, which rocked economies around the world. The culprit? In large part, the sub-prime mortgage crisis and the bankruptcy of Lehman Brothers.
Carlo Minassian |
08 Apr |
Read more
The phone rings in the middle of the night. It’s the Security Operations Centre and a server containing vital data has been hacked.
Elliot Dellys, Hivint |
08 Apr |
Read more
The Information Commissioner’s quarterly reports under the Notifiable Data Breaches scheme makes for some sobering reading - as do the results from recent research conducted by Brennan IT.
Stephen Sims |
05 Apr |
Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler |
05 Apr |
Read more
In Ridley Scott’s 1982 sci-fi film Blade Runner, the “future” is set in 2019. In this version, the grey skies are littered with flying cars called “spinners”.
Ashley Stevenson, ForgeRock |
04 Apr |
Read more
A growing number of organisations are making strategic choices to avoid relying too heavily upon any single cloud service provider. In other words, they are pursuing multi-cloud strategies.
David Shephard |
03 Apr |
Read more
Managing cyber-security in a multi-cloud environment comes with its own suite of organisational challenges.
Peter O'Connor, Snowflake |
02 Apr |
Read more
According to recent research by KPMG, almost half of all local councils in Australia are planning to implement smart city strategies
Ian Yip |
25 Mar |
Read more
Facebook is under scrutiny again, this time for its ethically questionable "research project" that involved releasing a data mining app to consumers that was intended for internal corporate use under Apple's licensing agreement.
Sam Bocetta |
25 Mar |
Read more
Cyberthreats have never been more widespread, persistent, and potentially impactful as they are now, and each attack has the potential to bring an organisation to its knees.
Peter Fuller |
25 Mar |
Read more
Bring your own device (BYOD), where employees work from personal devices such as mobile phones and laptops, is quickly becoming the norm in today’s business environment.
Anurag Kahol, Bitglass |
15 Mar |
Read more
Businesses around the world have quickly embraced cloud technology as a critical solution to tackle operational complexities.
Michael Chetner, Zoom |
15 Mar |
Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal |
15 Mar |
Read more
You’ve spent years building perimeter defenses against cyberattacks. With a strategic combination of VPNs, intrusion detection and prevention systems, firewalls, antivirus software, and SIEM systems, you’ve built a moat around your network that keeps even advanced attackers at bay.
Ilan Paretsky |
15 Mar |
Read more
Trust is a fickle concept in IT security. We trust that our applications are secure up until that trust is violated — like after a vulnerability is exposed or after an outage or breach.
George Tsoukas, Avi Networks |
15 Mar |
Read more
Failure has always been baked into the DNA of most successful cybersecurity awareness training programs.
Garrett O’Hara |
11 Mar |
Read more
The reality is that traditional development methods lack the agility needed to keep up with modern security needs. So how do businesses keep their security processes aligned? Enter: DevSecOps.
Yannick Townsend |
11 Mar |
Read more
Online burglars are just as devious as those in the flesh, if not more. They both have a goal and an understanding of how to reach it, irrespective of how much ingenuity and effort is required.
David Piggott |
11 Mar |
Read more
The digital age is maturing to the point where it’s no longer about what we can do, but whether we do the right thing. Where does that leave the question of facial recognition in schools?
Colin Anson |
11 Mar |
Read more