

Rosalyn Page
Contributing Writer
Rosalyn Page has been writing about technology long enough to remember when the only thing to worry about was Y2K. Since then, the dot-com boom became the dot-com bubble, technology fundamentally altered our lives, and everything has become about security. With a particular interest in privacy, data, and security, Rosalyn has covered social media, AI, IoT, deepfakes, marketing tech, the cloud, enterprise tech, consumer tech, and digital transformation. Her side gig is an arts and culture blog, ‘Some Notes from a Broad’. And when not wrangling bits and bytes into words, Rosalyn enjoys low-fi hobbies like reading books, walking her Whippet Sketch, and having one too many coffees at her favourite café.

Strategic risk analysis is key to ensure customer trust in product, customer-facing app security
CISOs must work with other stakeholders to define priorities when undertaking risk assessment of products and customer-facing apps.

Plan now to avoid a communications failure after a cyberattack
CISOs should take the lead to develop a post-cyberattack communications plan that accurately informs stakeholders and instills confidence in their organizations' response.

How CISOs can manage the cybersecurity of high-level executives
C-suite executives and board members are targeted through their personal devices as cybercriminals look to penetrate corporate systems and access sensitive and proprietary information. Protecting them requires a holistic approach.

How Australia and New Zealand CISOs can get ahead of supply chain attacks
With threats on the rise, Australia and New Zealand CISOs are facing the challenge that an attack on one organisation can become a common vulnerability.

Australian CISOs face growing ransomware, supply chain threats
Australian CISOs should be on high alert as ransomware continues to pose a grave security risk to organisations, but they shouldn’t overlook the threats from supply chain issues, where one breach can have a multiplier effect spurring...

How GDPR has inspired a global arms race on privacy regulations
Companies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.

What will the Australian privacy law review deliver?
A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.

The state of privacy regulations across Asia
While GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.

Spike in encrypted malware poses dual challenge for CISOs
Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.

Australia targets ransomware with new national plan
The federal plan brings together legal and policing for a coordinated response to surge of ransomware, but the proposed approach raises several questions.

4 steps to protect the C-suite from business email compromise attacks
Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.