Five Eyes Release Guidelines for Business Leaders on Securing Intellectual Property

The Five Eyes coalition’s principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. Read more »

NordVPN vs. ExpressVPN: Which VPN Is Best for 2023?

NordVPN or ExpressVPN? Read this in-depth comparison to find out which VPN provider comes out on top in terms of features, security, speed, and more. Read more »

Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

Rapid7’s Jaya Baloo says a deficit in Australian organisational IT asset and vulnerability understanding is helping threat actors, and this is being exacerbated by fast growth in multicloud environments. Read more »

What Australian IT Leaders Need to Focus on Ahead of Privacy Act Reforms

The Australian federal government aims to deliver changes to privacy laws in 2024. Organisations are being warned to prepare ahead of time by creating a comprehensive map of organisational... Read more »

New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured. Read more »

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub. Read more »

Software Supply Chain Security Attacks Up 200%: New Sonatype Research

Sonatype’s 9th annual State of the Software Supply Chain also covers regulations and how AI could help developers protect organizations from security risks. Read more »

Is Collaboration The Key To Aussie Tech Challenges?

As Australian organisations and government departments continue to struggle with IT resourcing, a new wave of collaboration potentially represents the solution. Read more »

Power Checklist: Vetting Employees for Security Sensitive Operations

Most organizations have applications, processes and data that must be kept secure by authorized personnel. Determining the eligibility of individuals to access or administer these components can be a... Read more »

GDPR Consent Request Forms: Sample Text

The European Union’s General Data Protection Regulation requires every organization that collects sensitive personal data from those residing in the EU to ask for clear and specific consent before... Read more »
Subscribe to our Newsletter