Articles
How to protect low-code from external rogue factors
How important is governance in mitigating the risk and challenges of integrating low-code? [ + ]
Reduce the risk of accounts payable fraud
As businesses integrate more flexible, technology-driven tools and processes, they also expose their operations to additional risks. [ + ]
Why you need a cyber crisis management plan
Developing a cyber crisis management plan can help minimise an attack's ongoing damage and also prepare the organisation's response to future threats. [ + ]
Mitigating the rise of double extortion ransomware
Ransomware perpetrators have evolved their business model to include a second catastrophic phase — double extortion ransomware. [ + ]
The future of generative AI in business
As AI continues to evolve, IT leaders need to understand the latest developments and invest in the right technologies and tools to stay ahead of the curve. [ + ]
If data is the new oil, why are we just giving it away?
Despite the proliferation of IT and data specialists working in organisations, most don't have any idea what data they hold and where that data is kept. [ + ]
Threat spotlight: Malicious HTML attachments double
Barracuda Networks CTO Fleming Shi shines a light on the cybercriminal misuse of HTML as an attack tool. [ + ]
Data at risk in elite Australian schools: study
More than 85,000 private school students and staff in Australia are vulnerable to email-based phishing attacks, according to new analysis. [ + ]
Cracking the skills shortage... should you go offshore?
The ability to now work from home means resource-strapped organisations need not limit their recruiting and hiring practices to domestic borders. [ + ]
Protection from scams shouldn't sacrifice privacy
When dealing with individually personal cyber threats, the balance of privacy and protection can become misconstrued. [ + ]
Security and compliance: from challenge to opportunity
Businesses must invest in solutions, best practices and processes that ensure they keep up with changing legislation and regulatory requirements. [ + ]
Cybercriminals can steal your voice in three seconds
Using AI tools, it's easy to manipulate images, videos and — perhaps most disturbingly — the voices of friends and family members. [ + ]
The danger of AI built on poor data quality
Even the most sophisticated algorithm will spew out rubbish if it is not supplied with the right input, making high-quality data essential to AI and ML success. [ + ]
More than a day: long-term password integrity
Password best practices shouldn't be limited to a single day each year. Password integrity is a discipline that should be strived for year-round. [ + ]
Pressures impacting the Australian service industry
As service industry professionals look to recover from the effects of the pandemic, businesses must ensure they are prioritising innovation that will maximise efficiency and reduce costs. [ + ]