Insider
Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!
Defending quantum-based data with quantum-level security: a UK trial looks to the future
Telecommunications giant BT is testing secure quantum data transmission over a network in what could be a glimpse into the shape of things to come for cybersecurity in a quantum computing world
Lessons learned from Nine’s ransomware nightmare
Nine CITO Damian Cronan and group director of IT security Celeste Lowe talk about the cyberattack and what changed at the organisation after.
9 top identity and access management tools
Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.
Even with board support, Horizon Power’s CISO was in for a shock
Everything seemed like it was going well for Horizon Power, a Western Australian power supplier that had been actively updating its cybersecurity practices to support a major digital transformation project aiming to tap data-driven...
Australian companies face Russian revenge attacks and Chinese expansionism
Western agencies warn of potential Russian cyberattacks on critical infrastructure in retaliation for supporting Ukraine, while Chinese entities appear to be moving away from amateur cyberattacks and espionage to a more coordinated,...
How ASD plans on spending $9.9 billion on cybersecurity—and find the staff
The Australian Signals Directorate has hundreds of experts ready to go, the secuyrity agency’s director-general says as she dismisses skills-gap concerns.
How GDPR has inspired a global arms race on privacy regulations
Companies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.
What will the Australian privacy law review deliver?
A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.
The state of privacy regulations across Asia
While GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.
Australian CISOs continue to struggle on privacy
New ISACA research shows that Australian organisations—including regulators—can’t find sufficient staff to treat privacy by design as seriously and thoroughly as needed.
Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.
Helping Australian school kids and teachers learn cybersecurity
Grok Academy’s CyberSteps program has helped train 170,000 Australian students already.
IBM service aims to secure multicloud operations
IBM’s new Unified Key Orchestrator lets customers integrate multiple security key-management systems into a single managed service that spans hybrid and multicloud environments.
Australia Labor Party wants a dedicated cybersecurity minister: Would it help?
As the Russian invasion of Ukraine reverberates online, Labor’s “better and smarter” cybersecurity ideas will face a complex cybersecurity reality to better protect Australian businesses.
Russia’s Ukraine invasion pushes Aussie CISOs to counter heightened critical-infrastructure threat
Australian businesses are advised to review their security exposure as new legislation progresses—and an increased cyberattack risk looms.
Australia’s election officials brace for interference, both foreign and technological
The risk of social-media manipulation exacerbates the fallout from an online-voting disaster.
Anatomy of an Australian ransomware response
Compromise was six months in the making and took three weeks to fix.
Australian financial-services companies fall short of cybersecurity goals
Companies continue targeting supply-chain risk after two years of little improvement in achieving resilience to attacks.
Become An Insider
Sign up now and get FREE access to
hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content.
Learn more.
BrandPosts
Learn more-
Sponsored by CSO Online
-
Sponsored by Fortinet
-
Sponsored by CrowdStrike