Culture
Snyk ramps up presence in New Zealand
The developer security company has expanded its investment in the Asia-Pacific, appointing new representatives to ...
US Cyber Command identifies Iranian threat
Open-source tools deployed by malicious Iran-based cyber actors have been exposed.
Corporate extortionists get focused on skills specialisation
As attackers adopt a more “professional” approach, defenders need access to better tools and bigger teams to counter the ...
CSIRO, defence industry partner to develop virtual defence work experience program
The Defence Industry Virtual Work Experience Program has been developed to provide real-world work experience to high ...
Why zero trust is critical in the modern hybrid workplace
The widespread introduction of hybrid working has changed the rules of the game when it comes to IT security
What’s next for data protection in 2022?
Shiva Pillay and Anthony Spiteri from Veeam Software outline their predictions for the data security environment in 2022
New global malware threat identified
Over 30,000 computers across 195 countries have been hit by a newly exposed spyware threat.
IBM to deliver cyber training program in SA
The global IT giant has partnered with the South Australian government to deliver a cyber education program to high ...
Why multi-factor authentication is vital for a valid cyber insurance policy
Anthony Daniel from WatchGuard Technologies explains why organisations must consider MFA before acquiring cyber ...
How XDR can help to extract more value from your SIEM
Joanne Wong from LogRhythm explains how stakeholders can leverage XDR to gain a clearer picture of developments across ...
The challenge of protecting personally identifiable information in the cloud
Peter O’Connor from Snowflake outlines the obstacles associated with transitioning PII to cloud platforms.
It’s time to talk about scams
Josh Lemon from the SANS Institute flags risks associated with the growing scam threat, outlining strategies to help ...
Organisations need to watch for ‘low and slow’ intrusions amid spike in cryptojacking activity
Nick Lowe from CrowdStrike explains why organisations need to be on guard against mounting threats in the crypto space