Tech Categories

API Security: Protecting Against Persistent Automated Attacks

As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.

Five Ways to Ensure Compliance when Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat...

Best-Practice Ways to Prevent Phishing Attacks

They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result can be open access to their organisation’s entire IT infrastructure.

read more

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes.

read more
From the Archives