IoT devices: The Trojan Horses of our time
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler | 05 Apr | Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler | 05 Apr | Read more
In Ridley Scott’s 1982 sci-fi film Blade Runner, the “future” is set in 2019. In this version, the grey skies are littered with flying cars called “spinners”.
Ashley Stevenson, ForgeRock | 04 Apr | Read more
Managing cyber-security in a multi-cloud environment comes with its own suite of organisational challenges.
Peter O'Connor, Snowflake | 02 Apr | Read more
According to recent research by KPMG, almost half of all local councils in Australia are planning to implement smart city strategies
Cyberthreats have never been more widespread, persistent, and potentially impactful as they are now, and each attack has the potential to bring an organisation to its knees.
Peter Fuller | 25 Mar | Read more
Businesses around the world have quickly embraced cloud technology as a critical solution to tackle operational complexities.
Michael Chetner, Zoom | 15 Mar | Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal | 15 Mar | Read more
You’ve spent years building perimeter defenses against cyberattacks. With a strategic combination of VPNs, intrusion detection and prevention systems, firewalls, antivirus software, and SIEM systems, you’ve built a moat around your network that keeps even advanced attackers at bay.
Ilan Paretsky | 15 Mar | Read more
Trust is a fickle concept in IT security. We trust that our applications are secure up until that trust is violated — like after a vulnerability is exposed or after an outage or breach.
George Tsoukas, Avi Networks | 15 Mar | Read more
The reality is that traditional development methods lack the agility needed to keep up with modern security needs. So how do businesses keep their security processes aligned? Enter: DevSecOps.
Yannick Townsend | 11 Mar | Read more
Online burglars are just as devious as those in the flesh, if not more. They both have a goal and an understanding of how to reach it, irrespective of how much ingenuity and effort is required.
David Piggott | 11 Mar | Read more
The digital age is maturing to the point where it’s no longer about what we can do, but whether we do the right thing. Where does that leave the question of facial recognition in schools?
Colin Anson | 11 Mar | Read more
Historically, death and taxes were cited as the only things certain in life. As the twenty-first century unfolds, it’s arguable a third item should be added to the list: cyber-security threats.
Mark Sinclair | 04 Mar | Read more
We all know how easy it is to rack up a financial debt in business – just by trying to stay afloat and meet the demands of customers, partners and staff. Most of us don’t realise we’re probably accruing other kinds of debt too – like technical debt.
Chris Maroun, CyberArk | 25 Feb | Read more
While there’s no silver bullet in cyber security, we do as businesses have access to artillery and air support in the form of collaboration.
Nick Ellsmore | 25 Feb | Read more
We use tools every day to do our jobs. We lose sight of this in our hectic lives with all the noise around us, but we need to consider that tools are used by people, and some people operate tools more efficiently than others.
Carbon Black | 20 Feb | Read more
How much trust should the Australian people put into businesses when it comes to storing their data?
Serkan Cetin, One Identity | 20 Feb | Read more
Cloud cryptojacking –image desc for 1 hijacking cloud resources to mine for cryptocurrency – is currently the fastestimage desc for 2-growing cybersecurity threat to the enterprise.
David Shephard | 15 Feb | Read more
Is your enterprise fully in the cloud or working from a mixture of software-as-a-service and on-premises solutions?
Geoff Andrews | 07 Feb | Read more
If your virtual private network (VPN) leaks, there’s no point in even turning it on.
Sam Bocetta | 07 Feb | Read more