Articles
How confident CEOs should look to take charge of cybersecurity
Confident, cyber-resilient CEOs are more confident and outperform their peers financially. [ + ]
How businesses can tackle AI-powered deep fake attacks
AI voice cloning tools and ChatGPT are being used to aid cybercrime and extortion scams. [ + ]
How developers can work with AI: four steps and four tools
How can developers take advantage of AI in the development cycle? [ + ]
2024 cybersecurity predictions: the effect of GenAI
GenAI just might be a 'search engine on steroids', but is it enough to reduce attacks? [ + ]
The elephant in the data centre: what is dark data and why does it matter?
Whatever dark data means to you or your business, it is an 'elephant in the room' for data centres. [ + ]
Navigating the crossroads of cybersecurity and mental health
The need for mental health support within the cybersecurity profession has been evident for quite some time. [ + ]
Revolutionising database management with database DevOps
Six ways database DevOps enhances efficiency and strengthens operations [ + ]
Cybersecurity can be a source of competitive advantage for Australia
Collaborating with industry stakeholders to devise a ransomware reporting obligation is a key facet of the government's latest cyber strategy. [ + ]
Time is the new currency in cybersecurity: how Aussie businesses can avoid losing it to hackers
With the ever-increasing speed and sophistication of cyber attacks, we need speed, scale and accuracy in all cybersecurity like never before. [ + ]
Inside Australia's drive to repatriate data and workloads
Many teams are shifting to a cloud-appropriate approach and altering their past hosting decisions. [ + ]
Top tactics to combat cybersecurity worker burnout
Burnout is well known to be rife among cybersecurity personnel. [ + ]
How to optimise the business value of cybersecurity
When engaging with business executives about cybersecurity it is important to present cybersecurity objectives in business terms that have meaning for them. [ + ]
Strategic cybersecurity is compliant by design
Compliance should be the by-product of systems and processes that are designed from the outset to be secure. [ + ]
Improving accessibility in the workplace
Australians living with disability and accessibility challenges face barriers to education and obtaining quality jobs, a pool of talent that should be embraced. [ + ]
The reckoning on cloud container and serverless security
Ephemeral infrastructure's transient nature has afforded it a 'free pass' on forensic examination in the past, but that window is closing. [ + ]