Unlocking Opportunities: Australian Talent in the US Job Market
In a recent episode of the KBKast podcast, host Karissa Breen sat down with Amy Meyer, an Australian expat who has successfully carved out a career in the United States. The conversation touched upon...
View ArticleThe Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024
With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity. The past year was defined by some...
View ArticleA Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step. Instead, the chain of execution not only involves multiple events, but also a continuous evolution of...
View ArticleCan Being “Compliant” Ever Top Being “Secure”?
In a 2016 case involving the North Korean-based Lazarus Group and the Federal Reserve Bank of New York it did. As a result of following compliance procedures related to red flags on an address, the...
View ArticleSailPoint completes IRAP Assessment, empowers Australian government agencies...
Australia, 14 November 2023 – SailPoint Technologies, Inc., a leader in enterprise identity security, announced today that it has successfully completed the Information Security Registered Assessors...
View ArticleCybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained...
View ArticleThe Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even...
View ArticleSeparating Fact From Fiction: The Importance of Transparency in Cybersecurity
In recent years, the internet has become a breeding ground for toxicity. People are more emboldened online, hiding behind pseudonyms and expressing their more divisive and extreme views. This has...
View ArticleSoftly, Softly: Why The Australian Cybersecurity Strategy Is A Missed...
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on...
View ArticleEscalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and...
View ArticlePhishing-Resistant MFA Helps Businesses Reduce Risk And Costs In The Face Of...
To address and insulate themselves from the growing trend of cyber security breaches, more businesses are turning to insurance agencies for cyber insurance policies. While these policies have been...
View ArticleA Skills Shortage Should Not Define An Organisation’s Cybersecurity Posture
Australia remains in the midst of a skills shortage, with slow hiring conditions occurring across the nation. Topping the most desired positions are cybersecurity professionals, according to recruiter...
View Article2024 Cybersecurity Predictions by Qualys
Reflecting on the past year, we’ve witnessed a notable transformation in how organisations perceive and prioritise their cybersecurity strategies, largely driven by evolving perspectives on its...
View Article2024 Cybersecurity Predictions from CyberArk
Over 2023, we’ve seen what I like to call the ‘verticalisation of cybersecurity’ taking effect, in that cybersecurity has finally taken centre stage in business discussions. If you see event agendas...
View ArticleBuilding Bridges: Developing Cybersecurity Skills And Elevating Talent
The cybersecurity sector is at a crossroads, grappling with what can only be described as an existential crisis. The gap in cybersecurity skills has grown to alarming proportions with Australia...
View ArticleA Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step. Instead, the chain of execution not only involves multiple events, but also a continuous evolution of...
View ArticleBattling Cyber Scams: Traditional Algorithms Won’t Cut it
Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From false billing scams – responsible for more than $22 million in losses in...
View ArticleA Legal Take On The Cybersecurity Strategy 2023-2030
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia’s blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the...
View ArticleBusinesses Need To Rewrite Their Identity Security Playbook For 2024
With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are...
View ArticleA Human Centric Tech Revolution in 2024
With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering...
View Article