Search:
CISO-SC
Investigating Cloud Permission Risks for CISOs in Southeast Asia Cloud environments now handle the majority of enterprise workloads, but this shift has introduced a critical vulnerability: excessive permissions. As organisations adopt multi-cloud infrastructure at speed, many are accumulating ...
From Reactive to Proactive: ANZ Security Leaders Dive Into Exposure Management
Traditional vulnerability management has become a compliance exercise rather than a security outcome. Security teams ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to ...
IT Observability Insights, ASEAN, 2024
While the progression to the hyperscale cloud and multi-cloud model has simplified many aspects of running computing ...
Considerations in Cloud Security, Australia, 2023
Discussing cloud infrastructure risk and resilience with Australian cybersecurity leaders Since the first major IT ...
Inside Active Directory Security, Australia, 2023
A major business technology control with massive security implications Active Directory architecture is critical to ...
Building Trust in Digital Government, Australia
Trust is Key to The Future of Digital Government Australian Government services, from census collection, licence ...
Measuring DevSecOps Effectiveness, Australia
The DevSecOps Shift Has Arrived The way applications are developed, deployed, accessed and used has changed. ...
Identity Risk Intelligence Trends Australia, 2022
Australian Cybersecurity Leaders Share Insights and Explore Challenges Related to the Future of Identity Security ...
