With 2018 coming to a close, the new year is on the horizon, and with it, new opportunities for enterprises to improve their security posture as bad actors elevate their tactics.
Lawrence Crowther, Head of Platform Architecture for APJ at Pivotal Software |
19 Dec |
Read more
Let's say I was a cybercriminal or Blackhat hacker (The idea of being a black hat hacker is humorous to me, it would be a stretch for me to even be a Grey hat but let's go with the story) and I am starting my week with considering my latest target to loot.
Craig Ford |
19 Dec |
Read more
As information security professionals approach the finish line of another year, it’s fair to say the past 12 months have once again been packed with incident.
Mark Lukie, senior sales engineer at Barracuda Networks |
18 Dec |
Read more
It’s a busy time of year. No matter the industry, the holiday season’s plateau in January is always preceded by the chaotic days and weeks in the lead up to Christmas.
Gary Mitchell |
18 Dec |
Read more
Staying abreast of the latest security tools, running more awareness training workshops for employees…the dawn of a new year is traditionally a time for turning over new leaves and resolving to do things differently and better.
Sumir Karayi |
11 Dec |
Read more
The couple weeks leading up to Christmas is always a chaotic and overwhelming time. You are attending Christmas social events, pulling late night work shifts to try and get your work finished before we all leave for that well-deserved break.
Craig Ford |
10 Dec |
Read more
It seems not a day goes by without another report of a high-profile cybersecurity breach affecting companies worldwide.
Bede Hackney |
18 Dec |
Read more
The dawn of a new year traditionally sees individuals resolving to abandon bad habits or adopt virtuous new ones. On the cyber security front, many Australian businesses would do well to turn over a new leaf in 2019.
Michael Warnock |
19 Nov |
Read more
Every time you connect to the internet, whether it's from a computer, tablet, or smartphone, you are vulnerable to cyberattacks from outside threats and hackers.
Sam Bocetta |
16 Nov |
Read more
The adoption rates of the cloud are steadily increasing. Organisations that swore never to touch public infrastructure and platform cloud are fast becoming converts.
Chris Pickett |
16 Aug |
Read more
Does your company have effective phishing protection in place or are too many hackers slipping through the net?
Mark Sinclair |
10 Aug |
Read more
High profile cyber-hijacks garnered their share of global headlines over the past year. From Equifax’s major breach to Yahoo’s three billion compromised usernames and passwords, hacks and attacks cost companies billions in reputational damage and cold hard cash.
Patrick Elliott |
18 Jul |
Read more
With the number of cyberthreats constantly on the rise, maintaining effective IT security has never been more challenging. Within many organisations, it’s resulting in growing feelings of panic.
Louis Abdilla |
16 Jul |
Read more
The digital revolution has been a catalyst for seismic change in the way healthcare is delivered but managing the security risks associated with this transformation remains a major headache for the sector.
Ken Pang |
02 Jul |
Read more
Picture this. You’re on a boat at sea that springs a leak. Your team is bailing frantically – but this will only keep the boat afloat for a short while. How can you save your boat and your crew from drowning?
David Oakley |
25 Apr |
Read more
The European Union General Data Protection Regulation (GDPR) will apply from 25 May 2018.
Ben Eagling |
01 Feb |
Read more
Exciting technology developments from the completion of Elon Musk’s giant solar battery in South Australia to the highly anticipated iPhone X have marked 2017 as a calendar year for technology in Australia.
John Leiseboer |
01 Feb |
Read more
Hackers are suffering from an image problem. Often thought of as anti-social geeks, hidden away in basements, the reality of modern hackers paints a different picture.
Graeme Pyper |
31 Oct |
Read more
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
Jon McGettigan |
30 Oct |
Read more
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings |
10 Oct |
Read more