Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Culture

How to keep your business-to-business email secure

How to keep your business-to-business email secure

Mark Lukie from Barracuda explains how organisations can bolster email security amid heightened vulnerabilities off the ...

Mark Lukie Thu, 07 Apr 2022
3 tactical steps to protect your critical data

3 tactical steps to protect your critical data

David Rajkovic from Commvault outlines practical steps for strengthening an organisation’s ransomware data protection ...

David Rajkovic Wed, 06 Apr 2022
3 ways to enhance customer trust in a hybrid world

3 ways to enhance customer trust in a hybrid world

David Willett from PEXA explains how organisations can earn consumer trust in the changing cyber security environment

David Willett Tue, 05 Apr 2022
XDR101 – Why it is a must for enterprises

XDR101 – Why it is a must for enterprises

Adam Philpott from Trellix outlines the benefits of extended detection and response capabilities, explaining why it must ...

Adam Philpott Mon, 04 Apr 2022
FEDERAL BUDGET: Industry reacts to $9.9bn REDSPICE project

FEDERAL BUDGET: Industry reacts to $9.9bn REDSPICE project

REDSPICE is the most significant single investment in the Australian Signals Directorate’s 75 years, and it is designed ...

Wed, 30 Mar 2022
Future of work and the role of technology in 2022

Future of work and the role of technology in 2022

As Australia continues to navigate the changing pandemic landscape, businesses and employees are looking to robust and ...

Pete Murray Wed, 30 Mar 2022
Time is of the essence in addressing a cyber attack

Time is of the essence in addressing a cyber attack

Carolyn Crandall from Attivo Networks explains how organisations can detect, contain and remove threat actors as quickly ...

Carolyn Crandall Tue, 29 Mar 2022
New ONI cyber centre unveiled

New ONI cyber centre unveiled

A multi-agency centre has been set up to capitalise on emerging technology opportunities in the cyber space.

Charbel Kadib Tue, 29 Mar 2022
The 6 steps to ensure cyber resilience

The 6 steps to ensure cyber resilience

Grayson Milbourne from Carbonite + Webroot outlines six ways organisations can shore-up their cyber defences in the ...

Grayson Milbourne Thu, 24 Mar 2022
Cloud services under attack: Closing the virtual open doors to cyber crime

Cloud services under attack: Closing the virtual open doors to cyber crime

With the new hybrid-working model, we see organisations increasingly moving more of their workload settings to the cloud

Justice Anyai Wed, 23 Mar 2022
The way we access data has changed; it’s time to change the way we protect it too

The way we access data has changed; it’s time to change the way we protect it too

Steve Moros from Proofpoint explains why organisations must adopt a new way of protecting sensitive data from both ...

Steve Moros Fri, 18 Mar 2022
How shared infrastructure collaboration will boost defence productivity

How shared infrastructure collaboration will boost defence productivity

We must work collaboratively on secure shared infrastructure for Australia’s sovereign industry to meet the big ...

Daniel Lai Wed, 16 Mar 2022
The role of the SOC when undertaking IT/OT convergence

The role of the SOC when undertaking IT/OT convergence

Joanne Wong from LogRhythm explains how security operations centres can be leveraged to support IT/IOT convergence.

Joanne Wong Tue, 15 Mar 2022