Long regarded by many as ‘toothless tigers’, 2019 could see Australian regulators wade more forcefully than before into the regulation…
In late 2018, on the final day of parliament for 2018, the Telecommunications and Other Legislation Amendment (Assistance and Access)…
As my many IT customers get more sophisticated and are improving the identification and response to breaches many manufacturing companies…
In today’s world awash with affordable data storage and processing, “Big Data” has emerged as a powerful approach to optimize…
This article gives an overview of the importance of data, what happens when we use data incorrectly and discusses how…
The group representation of thousands of cyber security professionals in Australia, from seniors to students, and otherwise just curious minds,…
Shamane Tan shares her story in this exclusive reveal. Given that this is a special women’s edition, what better way…
Magda Lilia Chelly is a CISO On Demand. Magda’ latest two projects covered the roles of a Regional ISO Lead…
Give a man a fish and you feed him for a day; teach a man to fish and you feed…
The recent Cyber Risk Meetup in Perth demonstrated well the West Australian cyber community’s enthusiasm, strength and passion for learning.…