Archive

Back to homepage
Expert Articles

Governance, Risk and Compliance – Enacting Proactive Risk Management

By Tom Kellermann, Chief Cybersecurity Officer for Carbon Black, In the highly regulated industries of finance, healthcare and energy, a focus on governance, risk and compliance (GRC) is crucial to

Cloud

New Open Source Solution Reduces The Risks Associated With Cloud Deployments

The technology will fight to protect people using desktop applications running on digital platforms such as Amazon Web Services (AWS). Galahad will leverage nested virtualization, layered sensing and logging to

Mobile

Mobile ID Schemes Take The Lead Over Digital Identity Cards

Emerging economies in Asia and Africa are some of the biggest markets, as countries leapfrog analogue identities to benefit from the efficiencies digital registration and management bring. Click here to

IT Compliance

Authentication in the Age of GDPR

It’s been over a year since the enforcement of the long-planned General Data Protection Regulation (GDPR) began, marking the start of a new regulatory era for data management. GDPR impacts

Hardware/Network

Over 800K Systems Remain Vulnerable to Bluekeep

Over 805,000 computers around the world are still vulnerable to the critical Bluekeep vulnerability, which experts have warned could create a worm-like threat worse than WannaCry. Security firm BitSight claimed that, as

Industry Insights

Getting the board on board with cyber-security: Top tips for making a compelling case for resources to safeguard the enterprise

Work for an organisation that’s become concerned about cyber-security? You’re far from alone. Thanks to a rash of high-profile attacks and incursions, Australian business leaders are woke to the damage

Industry Insights

Cyber security: Half of Manx people ‘risk being hacked’

Nearly all respondents said they had received a fraudulent email, while only two thirds were confident in their online security. The poll also found almost 40% did not know how

Industry Insights

Closing the Cybersecurity Poverty Gap

It is safe to say that public- and private-sector enterprises will see their cybersecurity risks and exposures continue to increase in the foreseeable future. More organizations are interlinking their mission

Cloud Expert Articles

Cloud Security For Businesses

By Katherine Palac – Director of Marketing at Column Information Security, Taking advantage of new technology means being cautious about it. Although the impulse for many businesses is to jump

Hardware/Network

6 Growth Hacking Tactics Every IT Security Company Must Exploit

There are plenty of lead generation strategies out there, but the most important part of all of this is creating a strategy that will take advantage of multiple channels of