As more businesses identify new use cases for artificial intelligence (AI), delivering significant benefits, the technology is also being used to create a concerning security threat: deepfake cyberattacks. Deepfake attacks leverage AI to create new identities, steal...
The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people...
In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their...
An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud’s...
With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will...
The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while...
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...
Artificial intelligence (AI) engines are starting to populate everywhere, with each new model and version seemingly offering more powerful and impressive capabilities that can be applied in a variety of fields. It’s been suggested AI should be deployed for writing...
Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified resources must hold a security clearance. This includes classified...
Like every facet of information technology, security has been a constantly evolving factor within organisations for decades. In its earliest phase, IT security efforts were focused on protecting the network perimeter, leveraging the classic castle and moat model. The...
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a...
Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business...