Articles
Why embedding trust in AI is critical to its future
The maturity of regulation and frameworks to effectively manage AI is still catching up with the technology, but trust needs to be embedded now. [ + ]
Australia is turning a corner in its adoption of passkeys
The past few months have shown that people and enterprises alike are now ready to accept passkey technology. [ + ]
Enter the IT leader: the evolving role of IT professionals
IT workers have evolved into strategic leaders within businesses, and moving forward they will require the right support to carry out their responsibilities successfully. [ + ]
Scattered Spider: where every click is one step closer to chaos
Cybercriminal group Scattered Spider often uses social engineering to gain access to identities and is slick at bypassing multifactor authentication. [ + ]
Putting people first in the AI revolution will drive your innovation engine
The role of tech leaders is to enable an organisation's people to harness the transformative potential of AI while ensuring trust and security in these tools. [ + ]
Navigating tech catastrophes: five key lessons from the CrowdStrike outage
As organisations continue to recover from the CrowdStrike incident, it is essential to reflect on the key lessons learned to mitigate the effects of future disruptions. [ + ]
What is the cost of a false alarm when it comes to data issues?
A documented triage process is necessary in order to weed out any misunderstandings and false alarms about data issues. [ + ]
Taming cloud costs and carbon footprint with a FinOps mindset
In today's business environment, where cloud is at the centre of many organisations' IT stack, the costs associated with the technology can get out of control. [ + ]
Balancing innovation with integrity to build trust in AI
Given the promising reports on AI one might assume its widespread adoption is inevitable, however, many share a more cautious perspective. [ + ]
How can Australia become an AI leader?
Australia is currently an AI innovator, scoring highly on AI maturity in a recent IDC study. [ + ]
The MediSecure breach thrusts the security spotlight back on service providers
Organisations have been confronting security risks in their supply chains for years, but a new wave of attacks is encouraging threat actors to redouble their focus. [ + ]
Cyber resilience: key takeaways from a global IT outage
One of the industry's largest IT outages in recent memory was an event that could easily have happened to any software provider. [ + ]
Managing third-party cybersecurity risks in the supply chain
Third-party cybersecurity breaches occur when the victim's defences are compromised through a partner or service provider. [ + ]
From a single update to global chaos: lessons from the CrowdStrike outage
In the wake of the CrowdStrike outage, IT leaders must examine the lessons learned and develop strategies to prevent similar incidents. [ + ]
Countering MFA fatigue demands a rethink on user authentication
While MFA remains effective, highly motivated threat actors are using tactics that seek to overcome this important security tool. [ + ]