Search:
Information Security
The rise of deepfake technology breeds a new cyber threat for financial institutions. As the tech behind these realistic fake videos and audio files becomes more advanced, it’s increasingly being used for fraudulent activities, identity theft, and damaging misinformation. Salinawati Salehuddin, ...
From Metrics to Mindset: In-Depth Perspectives on DevOps with Telstra's Nimisha Balyan
Corinium’s Maddie Abe spoke with Nimisha Balyan, Chapter Lead at Telstra about the human side of DevOps. As DevOps ...
Is Platform Engineering Replacing DevOps?
The rise of Platform Engineering is sparking intriguing discussions about its role in modern tech. Uncover why this ...
QA vs QE with Westpac’s Aya Omar: It's More Than Just Vowel Change
Aya Omar, Quality Engineering Senior Manager at Westpac Group, discussed the shift in the quality function within ...
The Top Six Cloud Cybersecurity Risks, Australia 2023
As cloud computing rapidly evolves, so too does the threat landscape that surrounds it. Cyber attackers are constantly ...
PEXA’s Tara Dharnikota: Using Tools and Tech to Build a Cybersecurity Culture
Tara Dharnikota unravels proactive cybersecurity practices With a diverse background that encompasses both network ...
Why the Exciting Rise of AI is Causing Sleepless Nights for CISOs
CSO Michael Poezyn says the explosion of AI, while transformative, is a cause of concern for CISOs With more than 20 ...
How to Avoid ‘Doom Fatigue’: UniSuper Cyber Resilience Manager
Unisuper Cyber Resilience Manager Christie Wilson explains her strategy for supporting her team and driving cultural ...
Threats Rising: ASD Director Sounds Alarm for Australian Organisations
Deanne Sowers, First Assistant Director-General for Cyber Threat Intelligence at the Australian Signals Directorate, ...
Considerations in Cloud Security, Australia, 2023
Discussing cloud infrastructure risk and resilience with Australian cybersecurity leaders Since the first major IT ...
Disruptive and Dangerous: Ransomware Survey Southeast Asia
Disruptions ranging from ‘moderate’ to ‘significant’ expected by many security execs in event of ransomware attack ...
Best-Selling Author Chirag Joshi: Optimising Cybersecurity Leadership and Well-Being
Chirag Joshi, Best Selling Author of 7 Rules to Influence Behaviour and Win at Cyber Security Awareness discusses ...
Inside Active Directory Security, Australia, 2023
A major business technology control with massive security implications Active Directory architecture is critical to ...
Australian Infosec Leaders Reveal Ransomware Weaknesses
Many organisations in Australia and New Zealand are likely to feel the pain of a ransomware attack if it occurred today ...
