Articles
The impact of a four-day work week on IT security
Security compromise detection relies on an established baseline of behaviour, but how do you establish a baseline when everything is abnormal? [ + ]
The automation generation: the AI-powered workforce
Unlike the previous defining generational categories, the automation generation encompasses all ages and demographics. [ + ]
Experts divided on need for regulation of AI
Researchers have differing opinions on whether there should be more regulation governing the development of advanced AI tools and products. [ + ]
How to protect low-code from external rogue factors
How important is governance in mitigating the risk and challenges of integrating low-code? [ + ]
Reduce the risk of accounts payable fraud
As businesses integrate more flexible, technology-driven tools and processes, they also expose their operations to additional risks. [ + ]
Why you need a cyber crisis management plan
Developing a cyber crisis management plan can help minimise an attack's ongoing damage and also prepare the organisation's response to future threats. [ + ]
Mitigating the rise of double extortion ransomware
Ransomware perpetrators have evolved their business model to include a second catastrophic phase — double extortion ransomware. [ + ]
The future of generative AI in business
As AI continues to evolve, IT leaders need to understand the latest developments and invest in the right technologies and tools to stay ahead of the curve. [ + ]
If data is the new oil, why are we just giving it away?
Despite the proliferation of IT and data specialists working in organisations, most don't have any idea what data they hold and where that data is kept. [ + ]
Threat spotlight: Malicious HTML attachments double
Barracuda Networks CTO Fleming Shi shines a light on the cybercriminal misuse of HTML as an attack tool. [ + ]
Data at risk in elite Australian schools: study
More than 85,000 private school students and staff in Australia are vulnerable to email-based phishing attacks, according to new analysis. [ + ]
Security and compliance: from challenge to opportunity
Businesses must invest in solutions, best practices and processes that ensure they keep up with changing legislation and regulatory requirements. [ + ]
Cracking the skills shortage... should you go offshore?
The ability to now work from home means resource-strapped organisations need not limit their recruiting and hiring practices to domestic borders. [ + ]
Protection from scams shouldn't sacrifice privacy
When dealing with individually personal cyber threats, the balance of privacy and protection can become misconstrued. [ + ]
Cybercriminals can steal your voice in three seconds
Using AI tools, it's easy to manipulate images, videos and — perhaps most disturbingly — the voices of friends and family members. [ + ]