Powered by MOMENTUMMEDIA
For breaking news and daily updates,
subscribe to our newsletter.
Explore
SECTIONS
MORE
Adam Philpott from Trellix outlines the benefits of extended detection and response capabilities, explaining why it must form a key part of organisations’ security ...
Adam Philpott • Sun, 31 Aug 2025
FEDERAL BUDGET: Industry reacts to $9.9bn REDSPICE project
REDSPICE is the most significant single investment in the Australian Signals Directorate’s 75 years, and it is designed to respond to the deteriorating strategic ...
• Wed, 30 Mar 2022
Future of work and the role of technology in 2022
As Australia continues to navigate the changing pandemic landscape, businesses and employees are looking to robust and long-term models of working. Pete Murray from ...
Pete Murray • Wed, 30 Mar 2022
Time is of the essence in addressing a cyber attack
Carolyn Crandall from Attivo Networks explains how organisations can detect, contain and remove threat actors as quickly as possible.
Carolyn Crandall • Tue, 29 Mar 2022
New ONI cyber centre unveiled
A multi-agency centre has been set up to capitalise on emerging technology opportunities in the cyber space.
Charbel Kadib • Tue, 29 Mar 2022
The 6 steps to ensure cyber resilience
Grayson Milbourne from Carbonite + Webroot outlines six ways organisations can shore-up their cyber defences in the heightened threat environment.
Grayson Milbourne • Thu, 24 Mar 2022
Cloud services under attack: Closing the virtual open doors to cyber crime
With the new hybrid-working model, we see organisations increasingly moving more of their workload settings to the cloud. While this transformation offers great agility ...
Justice Anyai • Wed, 23 Mar 2022
The way we access data has changed; it’s time to change the way we protect it too
Steve Moros from Proofpoint explains why organisations must adopt a new way of protecting sensitive data from both outside and within.
Steve Moros • Fri, 18 Mar 2022
How shared infrastructure collaboration will boost defence productivity
We must work collaboratively on secure shared infrastructure for Australia’s sovereign industry to meet the big challenges of providing Defence capability
Daniel Lai • Wed, 16 Mar 2022
The role of the SOC when undertaking IT/OT convergence
Joanne Wong from LogRhythm explains how security operations centres can be leveraged to support IT/IOT convergence.
Joanne Wong • Tue, 15 Mar 2022
WithYouWithMe launches new employment pathway with National Resilience Database
Australian citizens are now able to volunteer digital skills to government agencies when disaster strikes – and be paid for it – thanks to the launch of the National ...
• Wed, 09 Mar 2022
ASX 200 companies vulnerable to email risks
Over two-thirds of publicly listed organisations are susceptible to fraudulent email threats, according to new Proofpoint research.
• Tue, 08 Mar 2022
Retrospective deep dive into the Log4j vulnerability
Charlie Gero from Akamai Technologies outlines the lessons learned from responding to Log4j vulnerabilities.
Charlie Gero • Mon, 07 Mar 2022