Apple’s Face ID: An Insider’s Guide (Free PDF)

The Apple biometric sign-on tool, Face ID, has some advocates and some detractors. To help you decide which camp you’re in, this ebook offers a look at this new... Read more »

Block Ads for a Special Price of Just $10/Year

Block ads with a dual 3-year subscription plan of AdGuard VPN and AdGuard Ad Blocker, now available for just $29.97 through October 23. Read more »

Get a Lifetime Subscription of FastestVPN for just $30

In the market for a new VPN? The top-rated FastestVPN has been reduced to just $29.97 for a lifetime subscription if you get it by October 23rd. Read more »

Penetration Testing and Scanning Policy

System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. However, these incidents can be prevented by proactively detecting potential threat opportunities.... Read more »

Five Eyes Release Guidelines for Business Leaders on Securing Intellectual Property

The Five Eyes coalition’s principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. Read more »

NordVPN vs. ExpressVPN: Which VPN Is Best for 2023?

NordVPN or ExpressVPN? Read this in-depth comparison to find out which VPN provider comes out on top in terms of features, security, speed, and more. Read more »

Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

Rapid7’s Jaya Baloo says a deficit in Australian organisational IT asset and vulnerability understanding is helping threat actors, and this is being exacerbated by fast growth in multicloud environments. Read more »

What Australian IT Leaders Need to Focus on Ahead of Privacy Act Reforms

The Australian federal government aims to deliver changes to privacy laws in 2024. Organisations are being warned to prepare ahead of time by creating a comprehensive map of organisational... Read more »

New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured. Read more »

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub. Read more »
Subscribe to our Newsletter