As my many IT customers get more sophisticated and are improving the identification and response to breaches many manufacturing companies…
In today’s world awash with affordable data storage and processing, “Big Data” has emerged as a powerful approach to optimize…
This article gives an overview of the importance of data, what happens when we use data incorrectly and discusses how…
The group representation of thousands of cyber security professionals in Australia, from seniors to students, and otherwise just curious minds,…
Shamane Tan shares her story in this exclusive reveal. Given that this is a special women’s edition, what better way…
Magda Lilia Chelly is a CISO On Demand. Magda’ latest two projects covered the roles of a Regional ISO Lead…
Give a man a fish and you feed him for a day; teach a man to fish and you feed…
The recent Cyber Risk Meetup in Perth demonstrated well the West Australian cyber community’s enthusiasm, strength and passion for learning.…
The modern cyber battlespace now includes schools. In recent times there has been a trend towards cyber-attacks on softer targets,…
This article aims to present how a Japanese company, Nippon Telegraph and Telephone (NTT) Corporation, is now willing to share…