As Cybersecurity Awareness Month draws to a close, the message “Cybersecurity is Everyone’s Business” remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian...
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and...
As a parent of middle and high schoolersโand with some of their friends still in elementary schoolโI often find myself answering this familiar question: โWhen will I ever use math in real life?โ Itโs a fair question, one Iโve heard many times. So, inspired by my...
For Context As Australiaโs three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect...
Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia’s regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45...
Introduction In todayโs digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised...
Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the worldโs most widespread programming languages has shone a light on why the method we use to search for security...
You walk into a hospital where the power is out, patient records are inaccessible, and life-saving equipment has ground to a halt. It’s a stark reality we could face if we don’t act now. Cyberattacks aren’t just about stolen data anymore....
Watch The Interview ๏ปฟ Biography Pravjit (Prav) Tiwana is a technology executive with more than two decades of experience building highly scaled, cloud-powered products, services, and businesses. He is senior vice president and general manager responsible for...
Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions...
Introduction The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data,...
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 theme โSecure Our Worldโ highlights the pervasiveness of digital technologies that enable...