Featured posts
New research from Monash University presents the most effective approach to accurately predict vulnerabilities in software code and strengthen cybersecurity.…
By Jason Baden, Regional VP ANZ, F5. Multi-cloud environments are on the rise across enterprises in Australia; whether this phenomenon…
Kayelene is passionate about the prevention of child abuse and sexual exploitation, drawing on over 24 years’ experience of study…
For Australian organisations cyber resilience is more important than ever. In the seventh edition of Minter Ellison’s Perspectives on Cyber…
Willyama Services has launched a new subsidiary business named Willyama Cyber. Willyama Cyber was launched at their Canberra headquarters by…
Cohesity has announced the general availability of Cohesity FortKnox — a software as a service (SaaS) data isolation and recovery…
NIST announces the publication of a Cybersecurity White Paper (CSWP), Planning for a Zero Trust Architecture: A Guide for Federal Administrators,…
New Macquarie University research into phone scams has identified the scripts and emotions that drive most calls. A team of…
NIST has released a revision of Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (NIST Special Publication 800-161 Revision…
The Tangible Uplift Program has announced the launch of the Women in Security “Tangible Uplift” Program-2022, with My Security Media…