In today’s world awash with affordable data storage and processing, “Big Data” has emerged as a powerful approach to optimize…
This article gives an overview of the importance of data, what happens when we use data incorrectly and discusses how…
When I began asking CIOs what problem they were solving by hiring a security professional, the answers didn’t surprise me.…
The group representation of thousands of cyber security professionals in Australia, from seniors to students, and otherwise just curious minds,…
Ransomware sees a 325% increase from previous year, and is the fourth-most detected threat against businesses in APAC Malwarebytes has announced…
First endpoint security provider completes IRAP assessment to deliver services to Australian federal agencies BlackBerry Cylance has announced that it…
In this Cyber Security Weekly Podcast we interview Eaton’s Chief Technology Officer and security strategist, Michael Regelski. Michael has more…
NIST has published NIST Internal Report (NISTIR) 8204, Cybersecurity Framework Online Informative References (OLIR) Submissions: Specification for Completing the OLIR Template. The Framework…
Palo Alto Networks and GoDaddy recently collaborated to take down some 15,000 subdomains promoting weight-loss products and other goods promising…
The National Cybersecurity Center of Excellence (NCCoE) has published a preliminary draft practice guide, SP 1800-15, “Securing Small-Business and Home…