Phishing Attacks on Australian Organisations Disguised as Atlassian

Mimecast tells TechRepublic that AI may exacerbate phishing risks in Australia. Read more »

Is Cloud Fax Secure? Yes. Compliant? It Depends.

Explore cloud fax security and compliance. Learn about encryption, HIPAA, and records management for better document protection. Read more »

Is Google Password Manager Safe to Use in 2024?

Google Password Manager is a free password management service built into Chrome and Google apps. Learn how it works and how secure it is in this detailed review. Read more »

Cloud Security Policy

The purpose of this Cloud Security Policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for secure and effective cloud computing operations that ensure the integrity... Read more »

Advanced Threat Protection Solutions: Our Top Picks for 2024

Enhance your cybersecurity defenses with these top advanced threat protection tools that protect your organization against evolving threats. Read more »

Get Real-World Cybersecurity Skills for $30

Engage in active learning to build skills, confidence, and competence through practical, hands-on experience with professional feedback. Read more »

‘Titanic Mindset’: Just 54% of UK IT Pros Confident in Data Recovery

IT pros at U.K. companies are not regularly testing their data recovery processes, largely due to a lack of support from higher-ups. Read more »

Microsoft Initiative the ‘Largest Cybersecurity Engineering Effort in History’

The Secure Future Initiative was created around the same time the U.S. Cyber Safety Review Board chided Redmond for having a poor security culture. Read more »

2024 Exposed: The Alarming State of Australian Data Breaches

Implementing multi-factor authentication, supplier risk-management frameworks, and staff security training could help to reduce data breaches. Read more »

How to Create an Effective Cybersecurity Awareness Program

Cybersecurity awareness training is educational content designed to teach employees how to recognize cyberattacks and prevent or mitigate them. Given that human elements play a role in almost three-quarters... Read more »
Subscribe to our Newsletter