Addressing the security risks of BYO device
The head of security hastily leaves the meeting without excusing herself. Her body language indicates that it is an important call. As she walks back in, all eyes in the room subliminally pose the same...
View ArticleLogin to the real world with your Facebook account
It seems like every other website we visit today presents us with a “login with a social network” button. We are sometimes presented with a choice, usually between Facebook, Twitter or LinkedIn. But...
View ArticleIT security predictions for 2014
2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that...
View ArticleCryptojacking: The new threat on the block
Over the past year we’ve seen immense growth in the popularity and value of cryptocurrency, with leading cryptocurrencies such as Bitcoin reaching market value highs of $25,000 AUD in December 2017 for...
View ArticleWhy smart cities should aim for cyber resilience
According to recent research by KPMG, almost half of all local councils in Australia are planning to implement smart city strategies
View Article
More Pages to Explore .....