How I Differentiate the Unsupervised Newsletter & Podcast
I have been thinking about the rise of completely AI-generated newsletters for a long time now, and discussing these concepts with Clint Gibler and Joseph…
I have been thinking about the rise of completely AI-generated newsletters for a long time now, and discussing these concepts with Clint Gibler and Joseph…
Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration,…
Almost 100 federal government entities will need to have a designated chief information security officer (CISO) under revised rules agreed late last month. The rule…
Cybersecurity is not just a career field on the rise – it’s a calling that’s increasingly vital to the infrastructure of our world. But stepping…
The Commonwealth Bank of Australia’s innovation arm, x15ventures, is gearing up to incubate a spinout to address the rise in scam and fraud activity in…
I think I just figured out why so many people burn out in defensive cybersecurity after a decade or two. It’s because Defense is a…
Australian authorities had to formally invoke powers to get a client list from a breached IT services provider, as problems persist in getting organisations to…
At least 10 times a month I find myself in a book and they make a reference to some ancient concept, like Narcissus, or Oedepus,…
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition, a supply chain is the…
Okta, a prominent supplier of solutions for identity and access management, has disclosed that over the last several weeks, its clients have been the victim…
Tyro Payments has launched proceedings against Kounta for allegedly offering a competing product to Tyro merchants, in breach of an arrangement between the two. The…
Westpac is facing a fresh civil suit over IT system and process failures that caused customer hardship notices lodged online to not be passed through…