Asterisk Information Security is pleased to announce the appointment of Dr Peter Hannay to the role of Senior Security Consultant.…
Worrying about the tyres while the car’s on fire Growing up, my father constantly gave me advice in the form…
Data breaches expose everything from government identifiers to user account log-in names and passwords. Criminals can use the stolen information…
How can we provide better security for Internet of Things (IoT) devices? Yevgeny Dibrov writes that cybersecurity can be improved…
Stephen Bose, Head of Business Development for Australasia at iCetana introduces the company’s AI assisted video monitoring software and how…
Mourad Khalil, Principal Consultant for Technology Risk with Titan ICT Consultants discusses Titan’s historical network installation business, particularly within the…
Machine learning, as a concept, has existed since the first computer was created, which raises the question: Why has the…
NIST published the second draft of the proposed update to the Framework for Improving Critical Infrastructure Cybersecurity . This second draft update aims…
Botnets and command & control servers (a.k.a. C&C or C2 servers) are taking over the internet and are rapidly becoming…
I am new to the Cybersecurity industry, joining my old eGroup colleague, Graeme Speak almost a year ago. After watching…