For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.ย
Ana completed a PhD in cyber security strategy, entitled 'Educational pathways to national cyber resilience: the Australian story' (ANU, 2020); the thesis focused on growing Australia's future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in ...
The Voice of Cyberยฎ
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of ...
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when ...
An article around how to prioritise foundational cloud security before leveraging Generative AI.
Too often, having strong data processes can be seen as a โnice to haveโ. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved ...
In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing ...
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business ...
In The News
Sort By
- Date
- Title
IP Address Indexing is the first in a series of major performance and scalability enhancements to the Flowmon AI-powered Network Detection and Response & Network ...
Inaugural global study, with exclusive data from AI-powered Kyndryl Bridge, shows how executives, including Australian business leaders, rank risks, prioritise investments, ...
The global certification reinforces Gathidโs commitment to data integrity and privacy, and highlights its leadership in the identity and access governance market
Empowers enterprises to detect, investigate, and respond to malicious files with more speed and precision
Seattle, 16 October 2024ย โย ExtraHopยฎ, a leader in cloud-native ...
Outside of its high-profile technology sector targets, Anonymous Sudan frequently targeted entities in the telecommunications, healthcare, academic, aviation, government, ...
Poor password hygiene runs rampant with 67% of IT leaders and end users admitting to reusing system passwords
Podcasts On TECHNOLOGY