Rosalyn Page

Contributing Writer

Rosalyn Page has been writing about technology long enough to remember when the only thing to worry about was Y2K. Since then, the dot-com boom became the dot-com bubble, technology fundamentally altered our lives, and everything has become about security. With a particular interest in privacy, data, and security, Rosalyn has covered social media, AI, IoT, deepfakes, marketing tech, the cloud, enterprise tech, consumer tech, and digital transformation. Her side gig is an arts and culture blog, ‘Some Notes from a Broad’. And when not wrangling bits and bytes into words, Rosalyn enjoys low-fi hobbies like reading books, walking her Whippet Sketch, and having one too many coffees at her favourite café.

Security breaches push digital trust to the fore

Strategic risk analysis is key to ensure customer trust in product, customer-facing app security

Strategic risk analysis is key to ensure customer trust in product, customer-facing app security

CISOs must work with other stakeholders to define priorities when undertaking risk assessment of products and customer-facing apps.

Plan now to avoid a communications failure after a cyberattack

Plan now to avoid a communications failure after a cyberattack

CISOs should take the lead to develop a post-cyberattack communications plan that accurately informs stakeholders and instills confidence in their organizations' response.

How CISOs can manage the cybersecurity of high-level executives

How CISOs can manage the cybersecurity of high-level executives

C-suite executives and board members are targeted through their personal devices as cybercriminals look to penetrate corporate systems and access sensitive and proprietary information. Protecting them requires a holistic approach.

How Australia and New Zealand CISOs can get ahead of supply chain attacks

How Australia and New Zealand CISOs can get ahead of supply chain attacks

With threats on the rise, Australia and New Zealand CISOs are facing the challenge that an attack on one organisation can become a common vulnerability.

Australian CISOs face growing ransomware, supply chain threats

Australian CISOs face growing ransomware, supply chain threats

Australian CISOs should be on high alert as ransomware continues to pose a grave security risk to organisations, but they shouldn’t overlook the threats from supply chain issues, where one breach can have a multiplier effect spurring...

How GDPR has inspired a global arms race on privacy regulations

How GDPR has inspired a global arms race on privacy regulations

Companies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.

What will the Australian privacy law review deliver?

What will the Australian privacy law review deliver?

A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.

The state of privacy regulations across Asia

The state of privacy regulations across Asia

While GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.

Spike in encrypted malware poses dual challenge for CISOs

Spike in encrypted malware poses dual challenge for CISOs

Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.

Australia targets ransomware with new national plan

Australia targets ransomware with new national plan

The federal plan brings together legal and policing for a coordinated response to surge of ransomware, but the proposed approach raises several questions.

4 steps to protect the C-suite from business email compromise attacks

4 steps to protect the C-suite from business email compromise attacks

Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.

Load More