Articles
Cyber resilience: key takeaways from a global IT outage
One of the industry's largest IT outages in recent memory was an event that could easily have happened to any software provider. [ + ]
Managing third-party cybersecurity risks in the supply chain
Third-party cybersecurity breaches occur when the victim's defences are compromised through a partner or service provider. [ + ]
From a single update to global chaos: lessons from the CrowdStrike outage
In the wake of the CrowdStrike outage, IT leaders must examine the lessons learned and develop strategies to prevent similar incidents. [ + ]
Countering MFA fatigue demands a rethink on user authentication
While MFA remains effective, highly motivated threat actors are using tactics that seek to overcome this important security tool. [ + ]
Walking the talk on AI integration
Successful AI implementation will determine whether it can truly deliver on its promise. [ + ]
The rise of the do-it-yourself tech executive
We are now seeing corporate IT veterans with decades of experience choosing a career outside the corporate office. [ + ]
Four common zero-trust misconceptions derailing cybersecurity success
John Kindervag, creator of the zero-trust concept, explores the four most common zero-trust misconceptions. [ + ]
Tech debt: the hidden cost of innovation
Tech debt refers to the implied cost of additional rework a business risks when failing to conduct a thorough analysis of their current technology. [ + ]
Navigating the challenges of AI and risk
With more organisations looking to incorporate AI into their operations, the volume of sensitive data being processed and stored has skyrocketed. [ + ]
Why trusted data is mission-critical for building ethical AI
Low trust continues to impact the rate of adoption of artificial intelligence. [ + ]
Too much of a good thing: Australia's cyber overlap issue
Recent research indicates many organisations may have too many security systems with overlapping functions in place. [ + ]
The true cost of cyber attacks
The average annual expense of recovering and dealing with cyber attacks has surpassed AU$4.1 million. [ + ]
Tackling the human element in modern authentication: the phishing-resistant user
Integrating human-centric cybersecurity strategies is not merely an option but a necessity in today's threat landscape. [ + ]
Privacy Act reforms: how to innovate with less risk
With the OAIC calling for board members to be held personally liable for breaches, organisations will need to focus on accelerating AI efforts without risk. [ + ]
Futureproofing IT: why observability matters in the hybrid age
While hybrid cloud is becoming increasingly commonplace in the IT industry, on-premises infrastructure and the tools to manage it will remain fundamental. [ + ]