Security Roles
Cyber Security Engineer
VIC, Australia
Senior Security Analyst
NSW, Australia
Account Executive
Singapore, Singapore
IAM Manager
Manly, NSW, Australia
Regional Account Manager
NSW, Australia
Network Security Analyst
Boston, MA, United States
Software Engineer
NSW, Australia
SOC Lead
VIC, Australia
Security Governance Lead
NSW, Australia
Security Director
VIC, Australia
Cyber Risk Analyst
NSW, Australia
VP Cybersecurity
Singapore, Singapore
Business
Trustwave releases new SpiderLabs research focused on actionable cybersecurity intelligence for the hospitality industry
Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks encountered by the hospitality sector. Read More
Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals
Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes. Read More
Newest Podcasts

Media Releases
Market Movements
Editor’s Picks
How deep is the depth of the deepfake?
Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there. Read More
Recent Podcasts

Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity’s Prominent Place in the ESG Conversation: Protecting the Planet and Society

Episode 211 Deep Dive: Fernando Serto | AI in the Hot Seat: Examining the Unknown Threats, Mitigating Risks, and Exploring Opportunities in Cybersecurity
Technology
Automating evidence collection will improve your cloud incident response process
A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To address this challenge and better protect your environment, it’s crucial to utilise automation at the core of your cloud incident response program to remove complexities and manual steps associated with incident investigations. Read More
How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Read More
Best-Practice Ways to Prevent Phishing Attacks
They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result can be open access to their organisation’s entire IT infrastructure. Read More
Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals
Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes. Read More
Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings
Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces. Read More
Achieving a Robust Zero Trust Environment
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Read More
How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously. Read More
API Security: Protecting Against Persistent Automated Attacks
As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed. Read More
News
Media Releases
Other Recent Podcasts

Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity’s Prominent Place in the ESG Conversation: Protecting the Planet and Society

Episode 211 Deep Dive: Fernando Serto | AI in the Hot Seat: Examining the Unknown Threats, Mitigating Risks, and Exploring Opportunities in Cybersecurity
Security Roles
IAM Manager | Manly, NSW, Australia
Security Director | VIC, Australia
Cyber Risk Analyst | NSW, Australia
VP Cybersecurity | Singapore, Singapore
Cyber Security Engineer | VIC, Australia
Security Governance Lead | NSW, Australia
Senior Security Analyst | NSW, Australia
Account Executive | Singapore, Singapore
Regional Account Manager | NSW, Australia
Network Security Analyst | Boston, MA, United States
Software Engineer | NSW, Australia
Technology
Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings
Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces. Read More
Achieving a Robust Zero Trust Environment
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Read More
How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously. Read More
API Security: Protecting Against Persistent Automated Attacks
As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed. Read More
Business
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack
In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data. Read More
How purpose-built database security solutions ensure vulnerabilities aren’t overlooked
The perimeters of technological defences are shifting, and—in some cases—disappearing altogether. Read More
Doing more with less: the three key focus areas for cybersecurity
In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy. Read More
Improving an Organisations Cyber Efficacy and Effectiveness
While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them. Read More