The Pitfalls of Saying “Yes” Have you ever released a Minimum Viable Product (MVP) only to abandon it straight afterwards?…
Data Subject Requests (DSRs) — formal requests made to a company by a person to access, delete, or request not…
While the cloud offers substantial benefits to organisations, it also presents a new threat surface for malicious attackers to probe…
From the technical tools that help manage access control to non-technical skills like collaboration, learn about the fundamentals required in…
Telstra will push back the planned closure of its 3G network by two months to the end of August to…
05 May Palo Alto Networks EMEA & LATAM Launches On The Cybercrime Magazine Podcast Posted at 19:49h in Blogs by…
NBN Co is losing its CEO of almost six years Stephen Rue to Optus as the telco looks to “reset…
Ransomware drama: Law enforcement seized Lockbit group’s website again Pierluigi Paganini May 05, 2024 Law enforcement seized the Lockbit group’s…
About a week ago I sat down with Michal Bajor, a senior security engineer at Resonance Security, to discuss things we…
It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with…
Looking to streamline your compliance processes in 2024? Many compliance automation software options can help businesses stay on top of…
Macquarie Bank spent roughly $787 million on technology dedicated to ‘changing the organisation’ in the last financial year. More broadly,…











