The modern workplace has undergone a massive transformation over the last few decades. In a time of boundless connectivity, security management now extends beyond on-premises infrastructure and individual devices.
Graham Sowden, Okta |
20 May |
Read more
Ever logged onto a web site to be met with a pop-up box announcing that the connection is not secure and, consequently, your information may be at risk?
Scott Carter, Venafi |
20 May |
Read more
For decades, passwords have been the primary method of authentication used to protect data and accounts from unauthorised access.
Jerrod Chong, Yubico |
20 May |
Read more
The applications container market looks set to surpass the public cloud services and infrastructure market, at least in terms of compound growth percentage, and for good reason.
Bill McGee, Trend Micro |
20 May |
Read more
With Australia’s Federal election being held on Saturday 18 May, Australians need to be hyperaware of social networks to avoid consuming misinformation and falling victim to scams related to the election.
Crispin Kerr |
17 May |
Read more
If you thought masked hackers in dark rooms stealing data and threatening the integrity of your company's core systems were your only security concern, think again.
Mohamed Jafriin |
15 May |
Read more
In February 2019, LandMark White (LMW), Australia's largest independent property valuation firm publicly announced that a key online platform had been compromised and third parties had accessed over 100,000 records including property valuations, information of borrowers, lenders, homeowners and property agent data.
Ben DiMarco |
15 May |
Read more
IT security teams are overextended and understaffed, and security risks are occurring more frequently than ever before.
Simon Eid |
14 May |
Read more
Official recognition as a charity has given Australia-based privacy network Loki the confidence to take on additional developers who, the project’s cofounder says, are helping it expand the mobile capabilities of its globally adopted privacy tools.
David Braue |
09 May |
Read more
However, PAM solutions have evolved to become much easier to implement and use, and many are now designed for out-of-the-box deployment, enabling IT teams to get them up and running quickly without the need for expensive specialists.
Joseph Carson |
06 May |
Read more
In the leadup to every Australian Federal election, the topic of online voting creeps onto the discussion agenda.
Phil Kernick, CQR Consulting |
01 May |
Read more
It was Benjamin Franklin who once wisely quipped, “Nothing is certain except death and taxes.” I would add data breaches to that list.
Bede Hackney, Tenable |
01 May |
Read more
Does your organisation have a bird’s eye view of the company network or is its activity viewed ‘through a glass darkly’?
Jeff Costlow |
01 May |
Read more
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Steve Durbin |
30 Apr |
Read more
If you’re living off the land, there are a few different methods you can use to survive, but you need to use what you find where you are
Mark Goudie |
30 Apr |
Read more
Crowdsourcing, which involves the seeking of input or support for a venture from a large number of people via the internet, has become an unremarkable practice in recent times.
Budd Ilic |
29 Apr |
Read more
Winning a bet is one of life’s little pleasures. People make bets all the time. Many people even like to place wagers on the outcome of those bets. The trouble is gambling can become an addiction.
Andrew Huntley, Barracuda |
29 Apr |
Read more
When things go wrong, responsible people step up to the plate and take – responsibility.
Iris Zarecki, Continuity Software |
17 Apr |
Read more
When one thinks of a breach, there’s a cliché image of a mysterious hacker wearing a hooded sweatshirt trying to infiltrate a company’s online defences.
Rob Le Busque, Verizon Enterprise Solutions |
17 Apr |
Read more
Today’s cybersecurity professionals find themselves engaged in asymmetric warfare – and often on the losing end.
Brad Engstrom, VMware |
17 Apr |
Read more