
Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | December 14, 2015
CenturyLink’s four security predictions for 2016
According to CenturyLink’s Australian Hybrid IT Adoption Index, more IT decision-makers are adopting the hybrid…
Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | December 11, 2015
Palo Alto Networks’ 6 cybersecurity predictions for Asia Pacific in 2016
1. Ransomware Ransomware will continue to evolve its methods of propagation, evasion techniques and continue…

Communication | Cyber Security | Data Centres | Information | Security | Technology | December 11, 2015
MIF Regulation: have you paid attention to article 10?
Requirement for Visual and electronic identification of the card type Commonly known as the “MIF…

New PCI DSS Guidance From ISACA Helps Organisations Navigate Compliance Challenges
Implementing the demanding security requirements of the Payment Card Industry Data Security Standard (PCI DSS)…