Security Roles

Brought to you by:

Cyber Security Engineer
VIC, Australia

Senior Security Analyst
NSW, Australia

Account Executive
Singapore, Singapore

IAM Manager
Manly, NSW, Australia

Regional Account Manager
NSW, Australia

Network Security Analyst
Boston, MA, United States

Software Engineer
NSW, Australia

SOC Lead
VIC, Australia

Security Governance Lead
NSW, Australia

Security Director
VIC, Australia

Cyber Risk Analyst
NSW, Australia

VP Cybersecurity
Singapore, Singapore

Business

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web....

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether.

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond.

Automating evidence collection will improve your cloud incident response process

A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To address this challenge and better protect your environment, it’s crucial to utilise automation at the core of your cloud incident response program to remove complexities and manual steps associated with incident investigations.

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes. Read More

Why Banks are Increasingly Turning to External IT Security Resources

Why Banks are Increasingly Turning to External IT Security Resources

Thwarting cyberattacks is a key task for any CIO in the banking industry, however it’s not the only security-related challenge keeping them awake at night. Read More

Market Movements

Editor’s Picks

It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course conversation within our cybersecurity industry. As a result, this major breach has now commenced a class action lawsuit led by an Australian consumer law firm, Slater & Gordon.   In order to investigate this breach, Optus enlisted the services of Deloitte. However, Optus is currently seeking to prevent the disclosure of Deloitte's report on the cyberattack by invoking legal professional privilege.  Consequently, the customers whose data was compromised may be unable to ... Read More

Recent Podcasts

Technology

How Water Utilities can Boost Their Cybersecurity Resilience

How Water Utilities can Boost Their Cybersecurity Resilience

Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Read More

Best-Practice Ways to Prevent Phishing Attacks

Best-Practice Ways to Prevent Phishing Attacks

They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result can be open access to their organisation’s entire IT infrastructure. Read More

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes. Read More

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces. Read More

Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Read More

How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously. Read More

API Security: Protecting Against Persistent Automated Attacks

API Security: Protecting Against Persistent Automated Attacks

As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed. Read More

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers. Read More

News

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web....

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether.

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond.

Automating evidence collection will improve your cloud incident response process

A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To address this challenge and better protect your environment, it’s crucial to utilise automation at the core of your cloud incident response program to remove complexities and manual steps associated with incident investigations.

Security Roles

Brought to you by:

IAM Manager | Manly, NSW, Australia

Security Director | VIC, Australia

Cyber Risk Analyst | NSW, Australia

VP Cybersecurity | Singapore, Singapore

Cyber Security Engineer | VIC, Australia

Security Governance Lead | NSW, Australia

Senior Security Analyst | NSW, Australia

Account Executive | Singapore, Singapore

Regional Account Manager | NSW, Australia

Network Security Analyst | Boston, MA, United States

SOC Lead | VIC, Australia

Software Engineer | NSW, Australia

Technology

Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Read More

How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously. Read More

API Security: Protecting Against Persistent Automated Attacks

API Security: Protecting Against Persistent Automated Attacks

As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed. Read More

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers. Read More

Business

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether. Read More

Doing more with less: the three key focus areas for cybersecurity

Doing more with less: the three key focus areas for cybersecurity

In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy. Read More

Improving an Organisations Cyber Efficacy and Effectiveness

Improving an Organisations Cyber Efficacy and Effectiveness

While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them. Read More

Ways to Reduce the Risk of Burnout in your IT Security Team

Ways to Reduce the Risk of Burnout in your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out. Read More

Want amazing content for your audience?