Culture
What you need to know about the new ‘Essential 8’ mitigation strategies
Arun Raghu and Eder Plansky, principal security advisors at Trustwave, unpack the new strategy and explain how it will ...
Federal Treasurer backs economic recovery as NSW emerges from lockdown
EXCLUSIVE: As NSW today transitions out of lockdown, and with Victoria soon to follow, the federal Treasurer Josh ...
Protect: Understanding, Prioritizing and Reducing Industrial Cyber Risk
This is the second installment in a four-part blog series offering an in-depth breakdown of the four essential pillars ...
Ping Identity acquires Singular Key
Ping Identity has acquired Singular Key, a specialist in no-code identity and security orchestration.
Cyber attackers manipulating Google Forms: Sophos
Malicious cyber actors are exploiting the survey software to launch attacks against individuals and organisations, new ...
How 5G will change the future of smart cities in Australia
Smart cities are here, and they are getting smarter by the day with the support of 5G. Louise Hyland from AMTA ...
COVID-induced cyber vulnerabilities to linger: Veritas
Ransomware risks exacerbated by COVID-induced digitisation could persist for the next few years, according to new ...
Why attracting and retaining cyber specialists will be critical in the year ahead
As threat levels continue to rise, it’s vital to ensure you have an A Team in your corner, writes Glen Maloney from ...
Bot attacks on the rise while human attacks stagnate: LexisNexis Cybercrime Report
LexisNexis Risk Solutions released its Cybercrime Report this week, examining the cyber security trends over 2021.
How to build medal-winning data athletes
Geoffrey Coley from Veritas Technologies explains how organisations can inspire a “medal winning performance” from their ...
The great data ‘e-scrape’
Veteran cyber security advisor Eric Pinkerton explains how you can safeguard your personal data on social media ...
Ping Identity appoints new ANZ channel manager
A new channel manager has been appointed to spearhead the cyber security company’s operations across Australia and New ...
Countering the ‘careful attacker’
Sophistication is an overused expression when describing the aftermath of an attack – or at least, it was