by Sarwar Khan | Mar 28, 2024 | Sustainability
The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while...
by Edwin Kwan | Mar 25, 2024 | Application Security, Supply Chain
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...
by Matias Madou | Mar 25, 2024 | Application Security, Artificial Intelligence
Artificial intelligence (AI) engines are starting to populate everywhere, with each new model and version seemingly offering more powerful and impressive capabilities that can be applied in a variety of fields. It’s been suggested AI should be deployed for writing...
by Jamie O'Reilly | Mar 22, 2024 | ANZ, AUKUS, Government & Policy, Social Engineering
Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified resources must hold a security clearance. This includes classified...
by Scott Hesford | Mar 22, 2024 | Identity & Access Management, Security Operations
Like every facet of information technology, security has been a constantly evolving factor within organisations for decades. In its earliest phase, IT security efforts were focused on protecting the network perimeter, leveraging the classic castle and moat model. The...
by The Production Team | Mar 22, 2024 | Network Security, Security Operations, Threat Intelligence
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a...
by Louise Stigwood | Mar 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers
Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business...
by Debanjali Ghosh | Mar 21, 2024 | IWD, Work & Careers
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more...
by Mark Nutt | Mar 21, 2024 | Reports & Predictions, Risk Management, Security Operations
An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to...
by Jim Ivers | Mar 15, 2024 | Application Security, Exposure Management
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In...
by Brad LaPorte | Mar 15, 2024 | Leadership, Vendor Management
Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using. As a...
by John Penn | Mar 13, 2024 | IWD, Leadership
According to the 2023 Australian Government report ‘State of STEM Gender Equity 2023’, only 15% of STEM jobs are held by women – an under representation that presents a significant opportunity for organisations to advance female participation in this rapidly emerging...