
Machine learning, as a concept, has existed since the first computer was created, which raises the question: Why has the…

Join me on a brief trip back in time, to October of 2016. A co-worker stops by my desk with…

If you are a SMB owner and have ten minutes to spare, I have a scenario for you to consider.…

In the lead-up to Lynwen Connick’s keynote presentation at the AISA Conference 2018, members of the ANZ Information Security team…

This episode of the Cyber Security Weekly Podcast focuses on the Australian Information Security Association (‘AISA’), with a wrap up…




In this interview, Chris Cubbage interviews Shannon Sedgwick, CEO of GM Risk Group, a consulting firm specialising in protecting media…




This is the third of a group of interviews from the Risk Management Institute of Australasia (RMIA) in Canberra. In…


Botnets and command & control servers (a.k.a. C&C or C2 servers) are taking over the internet and are rapidly becoming…


On a chilly winter’s night in Perth, a handful of our local security practitioners met to discuss how we might…


I am new to the Cybersecurity industry, joining my old eGroup colleague, Graeme Speak almost a year ago. After watching…