Featured posts

Competition in Australia’s multi-billion-dollar education sector is driving institutions to embrace data analytics and cloud-based solutions and to invest in…

Launching at its MPOWER APAC event held in Sydney on the 30th of October, McAfee has released two local research reports exploring…

The 25 May 2018 enactment of the General Data Protection Regulation (GDPR), a European Union regulation, thrust many auditors into…


By Michael Bosnar October is cybersecurity awareness month and while following best practices are important every month of the year,…


The first public hearing on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 will be held on…


What is WA CyberWeek2018? Now 22 events registered!! Western Australia’s (and potentially Australia’s) largest cybersecurity festival, is a city-wide festival of…


In most cases, fake Flash updates pushing malware are not very stealthy. In recent years, such imposters have often been…




CSX also adds new Virtual Cyber Academy training subscription and CSXP exam Global technology and cybersecurity association ISACA, creator of…




Auditors are increasingly being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate…


Mike Hooper, Director of Digital Transformation (APAC) at OpenText A day in the life of the intelligent and connected enterprise…