Australians pessimistic that cybersecurity skills gap will be closed within a decade
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
But training providers, looking outside the industry for “a new breed of cybersecurity talent”, are doing their part to help
David Braue | 13 Dec | Read more
People skills as important in driving secure software culture as development skills, says Hannah McKelvie, manager of DevOps & Code Security at Telstra
David Braue | 11 Dec | Read more
Just investing in tools isn’t enough to keep good staff engaged
David Braue | 11 Dec | Read more
Microsoft's December Patch Tuesday brings fixes for 36 vulnerabilities, including one that's already under attack.
Darkweb sales have “all but faded” as exploit brokerages take over, Tenable finds as economic analysis maps the vulnerability-to-exploit ecosystem
David Braue | 10 Dec | Read more
To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty of other options out there—for your own research, and if you're not currently using a cloud backup service you may find reason to once you've seen what's on offer.
Ashton Mills | 30 Apr | Read more
Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.
Elias Plastiras | 29 Jun | Read more
Quantum decryption means the data you encrypt today will be compromised within a decade.
As users what we want is to share more and have more privacy. It is through this prisoner dilemma that over this weekend Digi.me, ID Exchange and Alibaba Cloud joined forces to bring the power of personal data and private sharing to communities in regional NSW by delivering the digi.spark hackathon hosted at UTS as part of New South Wales Spark Festival.
Abigail Swabey | 28 Oct | Read more
It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.
Abigail Swabey | 22 Oct | Read more
CSO & Enex Testlab join forces to deliver a first class IT Security event in Sydney's Four Seasons Hotel.
Abigail Swabey | 24 Sep | Read more
Canberra's EVOLVE.Cloud hit the streets with topline speakers
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.
Ellen Messmer | 08 Aug | Read more
To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.
The spooky season is still not over for Australian companies, as the destructive Emotet threat is back, and it is affecting unpatched systems.
James Ley, Ivanti | 09 Dec | Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText | 09 Dec | Read more
Tricking cyber-criminals into revealing their presence is becoming an increasingly popular way to safeguard systems and data from attack.
Modern terrorism and cyberwar are major threats to our society’s way of life.
Craig Ford | 30 Dec | Read more
You have a very secure environment, you have the latest firewalls which have been configured well, you have really good network segregation and you have the latest in endpoint detection and response platforms with a well-configured siem platform.
Craig Ford | 20 Dec | Read more