Phishing attacks remain prevalent and are a pressing reason for organisations across all industries to remain assertive and up to date in their cybersecurity practices.
Sean Duca, Palo Alto Networks |
10 Jul |
Read more
Cyber security is one of the fastest growing industries around the world. As more and more companies move their businesses online, the potential for hackers to access sensitive data and use it for their own gains grows.
Damon Culbert |
13 Jun |
Read more
Does your business have a well-defined data governance regimen? If not, you may be one of the sizeable contingent of Australian enterprises which are playing Russian roulette with information security – and potentially creating a major risk for their company’s viability.
Peter O'Connor, Snowflake |
21 May |
Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler |
05 Apr |
Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal |
15 Mar |
Read more
With 2018 coming to a close, the new year is on the horizon, and with it, new opportunities for enterprises to improve their security posture as bad actors elevate their tactics.
Lawrence Crowther, Head of Platform Architecture for APJ at Pivotal Software |
19 Dec |
Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks |
18 Dec |
Read more
It’s a busy time of year. No matter the industry, the holiday season’s plateau in January is always preceded by the chaotic days and weeks in the lead up to Christmas.
Gary Mitchell |
18 Dec |
Read more
The week in security was dominated by Parliamentary dealings over the controversial ‘Encryption Bill’ that was pushed through into law – despite early and eventually fruitless stonewalling by Labor – without what many observers warned was adequate supervision and adequate controls despite revelations that previous controversial telecommunications data retention legislation was being abused.
David Braue |
11 Dec |
Read more
During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Tim Murphy |
24 Apr |
Read more
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Manish Bahl |
26 Feb |
Read more
“What technology in the past has presented both opportunities and threats that we’ve managed to come to terms with that can provide us with lessons of learning to better meet the challenges of cyber security?”.
Brian Hay |
26 Feb |
Read more
The Internet of Things (IoT) might be a current hot topic in technology circles, yet linking electronic devices to improve efficiency and automate processes is not exactly a new concept.
Simon Howe |
26 Feb |
Read more
As demands increase on speed to deliver new software, services and value are increasing for all enterprises, including government departments, banks, and critical infrastructure, the agile new development mode ‘DevOps’ is taking hold.
Elizabeth Lawler |
15 Feb |
Read more
Today’s factories – be they relatively simple production facilities, or highly complex automation environments – face a dilemma that was unimaginable in earlier times.
Christoffer Karlsson |
01 Feb |
Read more
Is an overcrowded inbox too much to deal with leading into holiday break? No access to email may be worse than a stocking full of coal.
Garrett O’Hara |
24 Nov |
Read more
Hackers are suffering from an image problem. Often thought of as anti-social geeks, hidden away in basements, the reality of modern hackers paints a different picture.
Graeme Pyper |
31 Oct |
Read more
The fallout from the Equifax hack that affected 145.5 million people can provide valuable lessons to prevent similar incidents before they happen, both by Equifax itself and the industry at large.
Lisa Froelings |
25 Oct |
Read more
For many years, IT departments and their infrastructures were managed under a strict command-and-control structure. This situation is now rapidly changing, and CIOs need to change with it.
Sean Kopelke |
26 Sep |
Read more
The visibility and accessibility inherent in the role of an executive make them a prime target for cyberattacks. It’s important for the C-Suite to be aware of their vulnerabilities and how they can combat these in their daily work.
Darran Rolls |
20 Sep |
Read more