Dumping Ground
Start:
Start:
End:

Register

Editors Pick

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps...

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite....

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and...

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of cyber-attacks.

No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle ... Read More

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of cyber-attacks. Read More

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.   Read More

How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise. Read More

Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now. Read More

Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience. Read More

Share This