Modern Listing Example
Plugging the gaps: Australian organisations are leaving their defence barriers wide open for attackers
By Joseph Failla, leads Accenture security practice within Australia & New Zealand. When the Australian…
Australia’s Cyber Strategy: Navigating unchartered territories needs both caution & diplomacy
By Syed Munir Khasru As Australia grappled with a second wave of COVID-19 and consequent…
Securing the next generation digital infrastructure highlights from BlackHat Asia 2020
Originally scheduled for March, BlackHat Asia 2020 returned 29th September – 2nd October 2020 to…
Reverse engineering surveillance capitalism
By Iain Strutt The advent of the COVID-19 pandemic has seen many of us working…
Collective Defence: Adopting a collaborative approach to cybersecurity
There is no doubt the global COVID-19 pandemic has had a significant impact on our…
UpGuard Launches CyberResearch
UpGuard’s CyberResearch is a managed service offering combining third party risk management and data leak…
Oracle Cloud VMware Solution Obtains FedRAMP High Authorisation
Oracle Cloud VMware Solution has obtained Provisional Authority to Operate (P-ATO) at the High impact level…
The CISO’s Ultimate Guide to Securing Applications — 14 best practices to minimise and protect your data
By: Ian Hall, Head of Client Services, APAC, Synopsys Software Integrity Group No organisation wants…