Search:
Latest Posts
Australian Government's Protective Security Policy Framework amended to mandate cybersecurity leadership The Australian Department of Home Affairs' Protective Security Policy Framework has introduced policy changes that will mandate the appointment of a Chief Information Security Officer for ...
Enhancing Human Flourishing: The Synergy between Data and a Systems Approach
In this contributor piece, Chris Mesiku, Research Fellow at The Australian National University’s School of Cybernetics, ...
GeoScience Australia Unveils Digital Atlas for Interactive Data Visualisation
A beta version of new Digital Atlas of Australia that brings together datasets from across government to be visualised ...
Data isn't just for nerds, show your staff its value: ASIC's Darshil Mehta
ASIC CDAO Darshil Mehta discusses data culture and strategy development One topic that repeatedly comes up when ...
Five Major Active Directory Risks to Mitigate
Australian cybersecurity executives explore risks and challenges in aging Active Directory installs Active Directory is ...
The Top Six Cloud Cybersecurity Risks, Australia 2023
As cloud computing rapidly evolves, so too does the threat landscape that surrounds it. Cyber attackers are constantly ...
Pre-GPT Uncertainty? How ANZ Data Leaders Saw AI in 2022
A year ago, 30% of surveyed Australian and New Zealand data leaders expected AI to be a major driver of change in their ...
NAB Exec Unveils Data Architecture Insights
Ai Hua Kam, currently Head of Controls and Strategy with NAB, shares anecdotes about the rise of data in industry and ...
Threats Rising: ASD Director Sounds Alarm for Australian Organisations
Deanne Sowers, First Assistant Director-General for Cyber Threat Intelligence at the Australian Signals Directorate, ...
Considerations in Cloud Security, Australia, 2023
Discussing cloud infrastructure risk and resilience with Australian cybersecurity leaders Since the first major IT ...
Disruptive and Dangerous: Ransomware Survey Southeast Asia
Disruptions ranging from ‘moderate’ to ‘significant’ expected by many security execs in event of ransomware attack ...
APAC Government Data Execs Define Trusted Data
In this excerpt from Corinium’s Delivering Trusted Data in the Public Sector report, Government data executives from ...
Inside Active Directory Security, Australia, 2023
A major business technology control with massive security implications Active Directory architecture is critical to ...
Australian Infosec Leaders Reveal Ransomware Weaknesses
Many organisations in Australia and New Zealand are likely to feel the pain of a ransomware attack if it occurred today ...
Our Upcoming Events
Articles
Built-In, Not Bolted On: Rethinking Security as a Platform
Corinium’s Maddie Abe engaged with Rahul Trikha, Director of Technology Platforms & Developer Experience at Domain, to discuss the intersection of platform engineering and cyber security. In my earlier article on platform engineering, I explored whether platform engineering is replacing DevOps, ...
New Data Shows Why AI Governance Must Start Before You Build Anything
By the time your generative AI model is ready for production, it might already be too late to govern it properly A large wave of new enterprise AI projects is on its way. More than 80% of organizations in North America have at least 51 use cases in the pipeline, a survey published this week by ...
Building a Human Firewall from the C-Suite Down: Cyber-Awareness as a Strategic Priority
Phishing, ransomware, and other human-centric attacks continue to exploit gaps in judgement rather than gaps in code. This reality presents both a challenge and an opportunity: to reframe cyber awareness as a strategic leadership priority, not just a checkbox. Cyber security is a strategic concern ...
Building Adaptive and Future-Ready Enterprise Security Architecture: A Conversation with Yusfarizal Yusoff
Corinium’s Content Director, Eleen Meleng, spoke with Yusfarizal Yusoff, an experienced cybersecurity practitioner on the challenges to build a sound and scalable security architecture and the need for change in the industry. Enterprise Security Architecture (ESA) is fundamentally about designing a ...
Building a Human Firewall from the C-Suite Down: Cyber-Awareness as a Strategic Priority
Phishing, ransomware, and other human-centric attacks continue to exploit gaps in judgement rather than gaps in code. This reality presents both a challenge and an opportunity: to reframe cyber awareness as a strategic leadership priority, not just a checkbox. Cyber security is a strategic concern ...
Reports
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Unlocking the Potential of Interoperability in Federal Government
Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...
The New Era of Gen AI: Enabled by Logical Data Management
Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...
AI in Government: Building on Data, Context, and Trust for Success
The AI Readiness Imperative for Federal Agencies In an era where AI adoption is accelerating, federal agencies must balance innovation with responsibility. AI presents transformative opportunities—optimizing workflows, reducing costs, and improving public services—but only if built on a strong ...
The New Era of Gen AI: Enabled by Logical Data Management
Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...
Agresh Doshi: What insights in advancing data, AI and analytics are changing the public sector?
Corinium’s Vanessa Jalleh had the opportunity to speak to the Bureau of Meteorology’s Digital Development and Solutions Manager, Agresh Doshi. Agresh Doshi, the Bureau of Meteorology’s Digital Development and Solutions Manager, shares his thoughts on advancing data, AI, and analytics in the modern ...
DevOps Done Right: Unlocking DevSecOps Success at Toyota Finance Australia
Toyota Finance Australia’s Vijay Jay shares his team's inspiring journey to integrate security into their DevOps practices. DevOps is a constantly evolving field, and finding the right balance between security, agility, and efficiency can be a real challenge. Vijay Jay, the Practise Manager - ...
ANZ Bank Exec Discusses Key DevOps Challenges for Australians
Elizaveta Konovalova unravels the intersections of DevOps, DevSecOps, and the need for scalability. The demands of a rapidly changing tech and threat landscape has made building sophisticated Continuous Integration and Continuous Delivery pipelines and application security measures absolutely ...
DevOps Done Right: Unlocking DevSecOps Success at Toyota Finance Australia
Toyota Finance Australia’s Vijay Jay shares his team's inspiring journey to integrate security into their DevOps practices. DevOps is a constantly evolving field, and finding the right balance between security, agility, and efficiency can be a real challenge. Vijay Jay, the Practise Manager - ...