Why a ‘zero trust’ security strategy is the future for your business
The traditional approach to IT security has always been about building walls.
Richard Bird, Ping Identity | 08 Oct | Read more
The traditional approach to IT security has always been about building walls.
Richard Bird, Ping Identity | 08 Oct | Read more
The recent successful cyber-attacks against Victorian regional hospitals highlights a growing concern in cyber security and technology circles.
Shannon Sedgwick | 08 Oct | Read more
With organisations moving escalating volumes of data to the cloud, cyber security strategies need to be augmented with next-generation technologies that can provide increased levels of automation and boost threat-protection capabilities.
David Shephard | 30 Sep | Read more
As many of you would already be aware I have recently published a book “A Hacker, I Am" about all things cybersecurity.
Craig Ford | 30 Sep | Read more
It is no secret that Australia is one of the fastest growing markets in cloud adoption.
Anthony Spiteri, Senior Technologist at Veeam Software | 27 Sep | Read more
Cloud adoption in Australia could soon hit a major speed-bump: skills shortages in cloud security.
Corne Mare, Director of Security Solutions, Fortinet Australia | 27 Sep | Read more
In Australia, the Notifiable Data Breach scheme showed revealed that in the 12 months to May 2019 there were nearly 1,000 data breaches of which two-thirds were malicious and 32 percent were caused by human error. This statistic is proof that improving security systems in the modern workplace should be a priority.
Chris Stradling, Avanade Australia | 25 Sep | Read more
I remember growing up in the '80s and 90's seeing lots of movies where teenagers would try to make or buy fake id's
Craig Ford | 25 Sep | Read more
In an age of mobile devices, remote workers, and lightning speed innovation, cloud software and tools for collaboration are a no-brainer for any organisation to remain competitive
Fintan Lalor | 25 Sep | Read more
Many conversations about ransomware start with: “Are we going to pay?” Hopefully this happens before falling victim to an attack.
Andrew Huntley, Barracuda | 25 Sep | Read more
Enterprises are adopting SD-WAN solutions at an accelerating pace, largely due to it being a better fit than traditional router-centric WANs for today’s geographically distributed enterprises pursuing a cloud-first strategy for application delivery.
Graham Schultz, Silver Peak | 25 Sep | Read more
Whenever something goes wrong there’s a natural tendency to want to find someone to blame.
Mark Lukie, Barracuda Networks | 25 Sep | Read more
Despite higher levels of awareness among executives about cybersecurity risk, security and risk management leaders struggle to make a clear and defensible business case for investing in a security program.
Tom Scholtz | 25 Sep | Read more
With just 36% of Australians believing that their bank has their best interests at heart, it’s hard to argue that from a reputational perspective, the last two years have been some of the toughest years in recent memory for the Australian Banking & Financial Services sector.
Alvin Rodrigues Senior Director, Forcepoint | 25 Sep | Read more
The recent data breaches at Capital One and National Australia Bank (NAB) reinforce the evidence that human error represents a serious threat to organisations in finance.
David Shephard | 24 Sep | Read more
Data is the lifeblood of the modern enterprise. It is an abundant and essential resource, which never depletes nor wears out, yet it is becoming increasingly valuable over time.
Tony Stratton, APAC Sales Director, iland | 23 Sep | Read more
Last month, more than 1000 voice recordings captured by Google Assistant were leaked without users’ knowledge, each one allegedly containing personal data, private conversations and identifying features about the voices thereon.
James Slaney, Co-Founder and Head of Product, Dubber | 23 Sep | Read more
Stand firm or roll with the punches? In today’s complex and intensifying cyber-threat landscape, Australians enterprises should be ready to do both.
Simon Howe | 23 Sep | Read more
Since all sites and applications delivered over the Internet, and probably on private intranets, need to put security at their core, it is imperative that they use full data encryption.
Benjamin Hodge, Kemp | 23 Sep | Read more
Cyber criminals are using malware to steal computing power from various target devices in order to secretly mine cryptocurrency
Anurag Kahol, Bitglass | 23 Sep | Read more