Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Culture

The role of the SOC when undertaking IT/OT convergence

The role of the SOC when undertaking IT/OT convergence

Joanne Wong from LogRhythm explains how security operations centres can be leveraged to support IT/IOT convergence.

Joanne Wong Tue, 15 Mar 2022
WithYouWithMe launches new employment pathway with National Resilience Database

WithYouWithMe launches new employment pathway with National Resilience Database

Australian citizens are now able to volunteer digital skills to government agencies when disaster strikes – and be paid ...

Wed, 09 Mar 2022
ASX 200 companies vulnerable to email risks

ASX 200 companies vulnerable to email risks

Over two-thirds of publicly listed organisations are susceptible to fraudulent email threats, according to new ...

Tue, 08 Mar 2022
Retrospective deep dive into the Log4j vulnerability

Retrospective deep dive into the Log4j vulnerability

Charlie Gero from Akamai Technologies outlines the lessons learned from responding to Log4j vulnerabilities.

Charlie Gero Mon, 07 Mar 2022
Powerful and flexible: Why a well-managed fleet of devices will remain a critical business asset in 2022

Powerful and flexible: Why a well-managed fleet of devices will remain a critical business asset in 2022

As Australia moves into the new business year, enterprises will continue to rely on mobile technology to maintain ...

Kieran O’Connor Thu, 03 Mar 2022
Employees’ dodgy tech habits posing a risk to Australian businesses

Employees’ dodgy tech habits posing a risk to Australian businesses

KnowBe4 announced new research which has found that more than six in 10 Australian office workers (63 per cent) don't ...

Tue, 22 Feb 2022
Risky business: The GRC trends you need to be aware of in 2022

Risky business: The GRC trends you need to be aware of in 2022

After living through some very interesting times, the way in which Australian businesses perceive risk is evolving, and ...

Gaurav Kapoor Fri, 18 Feb 2022
ParaFlare, Deloitte to host cyber workforce forum

ParaFlare, Deloitte to host cyber workforce forum

Senior representatives from across the industry are set to take part in an open forum, aimed at exploring ways to ...

Tue, 15 Feb 2022
How to overcome the threats posed by zero-day attacks

How to overcome the threats posed by zero-day attacks

Matias Madou from Secure Code Warrior explains how organisations can build resistance to zero-day exploits.

Matias Madou Tue, 15 Feb 2022
Why you need tailored threat intelligence to mitigate cyber risk

Why you need tailored threat intelligence to mitigate cyber risk

Damian Gomez from Tesserent explains why organisations need to adopt a bespoke threat intelligence strategy for maximum ...

Damian Gomez Mon, 14 Feb 2022
Restricting privileges is important, but it’s not just about the IT administrator access

Restricting privileges is important, but it’s not just about the IT administrator access

Serkan Cetin from One Identity explains why organisations need to look beyond protocols put in place by IT ...

Serkan Cetin Tue, 08 Feb 2022
6 tips for supply chain cyber risk management in 2022

6 tips for supply chain cyber risk management in 2022

Henry Ward from Trustwave outlines the ways in which organisations can reduce their exposure to supply chain ...

Henry Ward Mon, 07 Feb 2022
ACSC launches internet safety guide

ACSC launches internet safety guide

The cyber agency has published new guidance to assist parents with the cyber security education of children.

Fri, 04 Feb 2022