by Scott McKinnel | Apr 16, 2024 | Artificial Intelligence, Exposure Management, Security Awareness
Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the...
by Alyssa Blackburn | Apr 15, 2024 | Artificial Intelligence, Data Management
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more...
by Taggart Matthiesen | Apr 10, 2024 | Artificial Intelligence, Data Management
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety...
by James Harvey | Apr 8, 2024 | Application Security, Cloud Security
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive...
by Scott Hesford | Apr 5, 2024 | Artificial Intelligence, Security Awareness
As more businesses identify new use cases for artificial intelligence (AI), delivering significant benefits, the technology is also being used to create a concerning security threat: deepfake cyberattacks. Deepfake attacks leverage AI to create new identities, steal...
by Guy Brown | Apr 5, 2024 | Leadership, Security Operations
The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people...
by Wayne Philllips | Apr 5, 2024 | Leadership, Work & Careers
In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their...
by Jay Parikh | Apr 4, 2024 | Artificial Intelligence, Microsegmentation
An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud’s...
by Hamish Soper | Apr 4, 2024 | ANZ, Crisis Management
With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will...
by Sarwar Khan | Mar 28, 2024 | Sustainability
The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while...
by Edwin Kwan | Mar 25, 2024 | Application Security, Supply Chain
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...
by Matias Madou | Mar 25, 2024 | Application Security, Artificial Intelligence
Artificial intelligence (AI) engines are starting to populate everywhere, with each new model and version seemingly offering more powerful and impressive capabilities that can be applied in a variety of fields. It’s been suggested AI should be deployed for writing...
by Jamie O'Reilly | Mar 22, 2024 | ANZ, AUKUS, Government & Policy, Social Engineering
Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified resources must hold a security clearance. This includes classified...
by Scott Hesford | Mar 22, 2024 | Identity & Access Management, Security Operations
Like every facet of information technology, security has been a constantly evolving factor within organisations for decades. In its earliest phase, IT security efforts were focused on protecting the network perimeter, leveraging the classic castle and moat model. The...
by The Production Team | Mar 22, 2024 | Network Security, Security Operations, Threat Intelligence
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a...
by Louise Stigwood | Mar 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business...
by Debanjali Ghosh | Mar 21, 2024 | IWD, Work & Careers
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more...
by Mark Nutt | Mar 21, 2024 | Cyber Resilience, Reports & Predictions, Risk Management, Security Operations
An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to...
by Jim Ivers | Mar 15, 2024 | Application Security, Exposure Management
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In...
by Brad LaPorte | Mar 15, 2024 | Leadership, Vendor Management
Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using. As a...
by John Penn | Mar 13, 2024 | IWD, Leadership
According to the 2023 Australian Government report ‘State of STEM Gender Equity 2023’, only 15% of STEM jobs are held by women – an under representation that presents a significant opportunity for organisations to advance female participation in this rapidly emerging...
by Mats Thulin | Mar 12, 2024 | Artificial Intelligence, Continuous Business, Critical Infrastructure
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business...
by David Marsh | Mar 12, 2024 | Identity & Access Management, SMB
Scams cost Australians more than $3.1 billion each year, with identity crime representing a contributing factor. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the...
by The Production Team | Mar 11, 2024 | IWD
“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or...
by Ashley Diffey | Mar 11, 2024 | Identity & Access Management
As the proportion of daily life conducted online continues to climb, people are increasingly concerned by the lack of control they have over their personal data. In fact, 66% of consumers feel they will never be fully in control of their data while only 33% are aware...
by The Production Team | Mar 8, 2024 | IWD
Time flies when you’re having fun, as the old saying has it. I must have been enjoying more than my fair share of it because, from where I sit, the years are racing along! For me, this year’s International Women’s Day comes hot on the heels of a milestone birthday –...
by The Production Team | Mar 8, 2024 | IWD
International Women’s Day provides a wonderful opportunity to reflect: on the enormous strides towards equality and equity our gender has made in recent decades; and on how much further we need to go before the scales are truly balanced. Speaking personally, I’ve seen...
by The Production Team | Mar 8, 2024 | IWD
The world continues to celebrate the achievements and contributions of women across various industries, it’s imperative to remind ourselves of the not so celebratory experiences that women encounter. Suzanne Vos, a recognised international Innovation Leader and...
by The Production Team | Mar 8, 2024 | IWD
The role of vulnerability in companies, specifically within leadership, has had a strong emergence in the workplace due to American Professor and Author Brené Brown. Vermaak leads with “servant-leadership” as the backbone of being a strong leader. It was...
by Kara Sprague | Mar 7, 2024 | IWD
As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since...
by The Production Team | Mar 7, 2024 | IWD
Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and...
by The Production Team | Mar 7, 2024 | IWD
What Does Inspiring Inclusion Mean To You? Inspiring inclusion, from my perspective rooted in my Asian background and experience working for a global company, entails proactively nurturing a space where every person, irrespective of their origins or identity, feels...
by Jason Whyte | Mar 7, 2024 | Data Management, Security Operations
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that...
by Christoph Nagy | Mar 5, 2024 | Application Security, Security Operations
The Extent of Deployment In recent years, cyberattacks against SAP systems have become more common, as 99 of the 100 largest companies in the world are SAP business applications customers with SAP customers generating 87% of total global commerce ($46 trillion),...
by Christoph Nagy | Mar 5, 2024 | Application Security, Artificial Intelligence, Security Operations
Since the rise of ChatGPT, we have seen new use cases for artificial intelligence (AI) in today’s operations almost every day. This trend is certainly also impacting the cybersecurity domain as IT threats are increasing in alignment with the number of...
by Josh Cigna | Mar 1, 2024 | Security Awareness, SMB
If you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse....
by Jason Duerden | Feb 29, 2024 | Artificial Intelligence, Security Operations
The State Of Play As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools. Capable of creating everything from text and images to computer...
by Tim Davoren | Feb 28, 2024 | Cloud Security, Security Awareness, Security Operations
Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and...
by Matias Madou | Feb 27, 2024 | Application Security, Product Development
With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either...
by Lee Roebig | Feb 26, 2024 | Cloud Security, Leadership, Microsegmentation, OT Security, Security Operations
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023...
by Sudip Banerjee | Feb 26, 2024 | Security Awareness, Zero Trust
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive...
by Anthony Daniel | Feb 26, 2024 | Identity & Access Management, Security Operations
Of all the causes of cybersecurity breaches within organisations, one of the most prevalent remains human behaviour. Indeed, according to a Verizon data breach report[1], human error is involved in 74% of data breaches. For this reason, it is vital that security teams...
by Lydia Hopton | Feb 22, 2024 | Governance & Risk
With growing concern and scepticism around the misuse of technology, it’s vital for organisations to have the right safeguards in place to protect their people and the business overall. It starts with the belief that the technology we use must earn our trust if it is...
by Pete Murray | Feb 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of...
by Robert M. Lee | Feb 21, 2024 | Geo-Political & Military, Government & Policy, OT Security, Reports & Predictions
Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organisations. The report...
by Sean Leach | Feb 20, 2024 | Leadership, Security Operations, Vendor Management
The seemingly unending list of threat actors successfully targeting Australian organisations, and a corresponding rise in financial losses and regulatory scrutiny, has firms, leaders and cybersecurity teams on edge. Australian and New Zealand businesses lost almost...
by Glen Maloney | Feb 16, 2024 | Application Security, Artificial Intelligence
Introduction Plain English is becoming increasingly vital in securing APIs against coding errors and business logic abuse, especially as the abuse of APIs by threat actors continues to grow. The current shortage of cybersecurity personnel and the lack of expertise in...
by Sarwar Khan | Feb 15, 2024 | OT Security, Sustainability
Once a marginal topic, sustainability is now critical focus area with commitment required at all levels of the company starting with the Board. It goes well beyond ticking off ESG goals to embedding a culture of change across the organisation – from the set of...