High profile cyber-hijacks garnered their share of global headlines over the past year. From Equifax’s major breach to Yahoo’s three billion compromised usernames and passwords, hacks and attacks cost companies billions in reputational damage and cold hard cash.
Patrick Elliott |
18 Jul |
With the number of cyberthreats constantly on the rise, maintaining effective IT security has never been more challenging. Within many organisations, it’s resulting in growing feelings of panic.
Louis Abdilla |
16 Jul |
The digital revolution has been a catalyst for seismic change in the way healthcare is delivered but managing the security risks associated with this transformation remains a major headache for the sector.
Ken Pang |
02 Jul |
Picture this. You’re on a boat at sea that springs a leak. Your team is bailing frantically – but this will only keep the boat afloat for a short while. How can you save your boat and your crew from drowning?
David Oakley |
25 Apr |
The European Union General Data Protection Regulation (GDPR) will apply from 25 May 2018.
Ben Eagling |
01 Feb |
Exciting technology developments from the completion of Elon Musk’s giant solar battery in South Australia to the highly anticipated iPhone X have marked 2017 as a calendar year for technology in Australia.
John Leiseboer |
01 Feb |
Hackers are suffering from an image problem. Often thought of as anti-social geeks, hidden away in basements, the reality of modern hackers paints a different picture.
Graeme Pyper |
31 Oct |
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
Jon McGettigan |
30 Oct |
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings |
10 Oct |
The frequency of financial crime and the diversity of attack techniques are increasing, forcing enterprises into difficult investment decisions to contain risks and comply with regulations.
Danny Luong |
14 Aug |
One of the primary expenses that a small business might face is the cost of insurance. And if your business works within the digital world, you’ll not only have to purchase business insurance, but cyber liability insurance too.
Richard Laycock |
01 Aug |
Machine-learning security tools flooding market but customers lack concrete methods for comparing their efficacy
David Braue |
18 Jul |
We have just witnessed two significant ransomware / malware attacks in as many months that caused a lot of disruption to businesses globally. Some like TNT are still struggling to recover at the time of writing this whitepaper (10-07-2017).
Ashwin Pal |
13 Jul |
Security leaders need to celebrate success with a better definition of winning
Michael Santarcangelo |
10 Jul |
In the last year, we’ve begun seeing more organisations both globally and in the Australia and New Zealand region embrace digital transformation in a big way and for good reason.
Michiel Jorna |
22 Jun |
The global WanaCry ransomware attack has shown how susceptible major, vital service organisations can be to cyber threats.
Michael Shepherd |
02 Jun |
In 1959, an IBM employee by the name of Arthur Samuel programmed a computer to play checkers against him. Over time, the program was able to collect data, strategise and win a game all by itself. And thus, machine learning was born.
Bryan Gale |
29 May |
Those who run IT departments have what I like to call ‘the burden of knowledge’. They know what can go wrong and how wrong it can go, so they also know how important it is to put the right safeguards in place to prevent that from happening.
Robert Linsdell |
25 May |
In 2015, the Australian Government’s ‘Stay Smart Online’ initiative released a report discussing the cost of cybercrime to our small businesses.
Richard Laycock |
22 May |
The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure.
Lauren Horaist |
08 May |