Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentinaโs shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics,...
In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can...
The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in todayโs evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security...
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the...
The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen...
Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in...
Introduction The ever-present threat of cyberattacks and a rapidly changing technological landscape have forced organisations of all sizes, particularly small businesses, to prioritise cybersecurity. An increased focus on centralised security operations for companies...
With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nationโs cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect...
Australian telcos and policymakers alike are increasingly displaying a keen interest in the number of outdated mobile handsets in use in the population. The reason for this is that a sizeable number of mobile users are about to be left behind by the steady march of...
When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory...
What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure....
A recent wave of large-scale password spray attacks has cybersecurity firms scrambling to warn their clients around the world. These attacks exploit weak credentials to gain unauthorised access to critical systems, potentially causing significant financial and...