Jack Viljoen, Head of Prodinity Cyber Solutions, provides a cyber safety 101 to avoid vendor-related cyber-attacks. By Jack Viljoen, Prodinity…
How do companies protect their digital environments in a world where everything is growing more complex, quickly – data, customer…
Dec 06, 2023NewsroomVulnerability / Mobile Security Chipmaker Qualcomm has released more information about three high-severity security flaws that it said…
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting),…
Kubernetes, often called K8s, is an open-source platform designed to automate the deployment, scaling, and operations of containerized applications. Kubernetes…
The NSW government has unveiled a suburb-level view of internet access and affordability across the state. The digital connectivity index…
Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their…
Victoria’s chief data officer Andrew Nipe has taken the position of chief consulting officer (CCO) at the federal government’s new…
Hackers target and exploit Outlook vulnerabilities because it is a widely used email platform, providing a large potential victim pool. …
ICANN is a non-profit organization that is responsible for coordinating the global internet’s- This organization manages the distribution and maintenance…
Cyber security firm SentinelOne forecast third-quarter revenue above Wall Street estimates and raised its annual revenue outlook, as cybersecurity spending…
ANZ Banking Group has signed a four-year technology agreement with IBM to support its digital transformation and core system modernisation….











