Articles
The power of full-stack observability
To manage diverse and complex networks, many organisations amass monitoring and managing tools — which tends to produce silos, not simplify things. [ + ]
Mitigating IoT and IIoT security risks
As organisations increasingly rely on IoT and IIoT to manage critical business systems, finding the right security approach is essential. [ + ]
Safeguarding Aussie data with GDPR
Going into the fifth year of the General Data Protection Regulation (GDPR), it is time to rethink how we look at data protection. [ + ]
How explainability will improve the human and AI relationship
With AI a non-negotiable element of security workflows, XAI will be critical for cyber professionals and executives alike. [ + ]
Securing the future of work
The transition to hybrid or fully remote work has delivered new aspects in the security equation that must meet corporate standards and requirements. [ + ]
What level of digital exposure is 'just right'?
A study of 6000 teenagers has suggested that the 'Goldilocks' hypothesis for digital exposure applies to young people. [ + ]
Academy to fast-track cybersecurity careers
A newly established Cyber Academy aims to increase Australia's cybersecurity workforce. [ + ]
Measuring inefficiency
With a view to improving my 'leanness' and stop myself working so many extra hours, I started collecting data around what I was working on. [ + ]
Perfect storm for security leaders
The pressure to ward off attacks has reached a critical level over the past 12 months, with traditional attacks on the rise in addition to a host of other issues. [ + ]
Patching alone won't stop cybercrime
Assuming that periodic software patching is enough in the modern cybersecurity landscape ignores the fact that software companies are not security companies. [ + ]
Perpetual transformation: DX is not a once-off
While digital transformation is crucial to business, if the transformation ends following go live of the underpinning technology, the benefits will diminish. [ + ]
Democratising software development
How do we ensure our tech talent is doing the highest value jobs? By enabling the non- and low-technical workforce to utilise no- and low-code technologies. [ + ]
Securing backups: defending your defence
Two-pronged ransomware attacks are increasingly common, making MFA mandatory for activity that could potentially see backup data manipulated or deleted. [ + ]
How digitising schools boosts their success
Just 47% of education institutions have a digital strategy in place to improve teaching and learning outcomes, according to a new study. [ + ]
Tiny transistors pave the way for new-gen 2D technology
Researchers from UNSW Sydney have developed a tiny, transparent and flexible material to be used as a novel semiconductive component in transistors. [ + ]