Robotics
Help from above
When drones became the unsung hero in the aftermath of Hurricane Katrina, Australia’s most prominent…
Now is the time for multi-modal biometrics at border security checkpoints
Border security today is facing a perfect storm of challenges that requires every tool available…
Trust and Stealth in the Cloud
Unisys’s Tom Patterson Discusses his Career as well as his latest work with Unisys Tom…
Locating a new weapon for Australia’s data detectives
In an era of big data, where every officer and vehicle is a sensor, how…
Verizon data breach
The 2016 Verizon data breach indicator report (DBIR) was released recently, described by Verizon as…
What we can do about ransomware – today and tomorrow
APAC countries must take note of the prevalence of ransomware attacks in the U.S. and…
Creating a professional development plan in information security
Working in cyber security is a viable career option for anyone who wants to give…
Creating a culture of security to defend against social engineering attacks
The Fifth Annual Benchmark study on Privacy and Security of Healthcare Data by Ponemon Institute…
Converge Information Technology (IT) and Operational Technology (OT)
ISACA and the International Society of Automation Issue Call to Action The convergence of information…
Fake lockscreen app on Google Play: Pokemon GO Ultimate
ESET researchers have discovered fake apps on Google Play targeting Pokémon GO’s hungry hordes. Among…
Fortinet Recognises Australian Partners at Regional Partner Business Retreat in China
Fujitsu Australia, Communications Design and Management, and The Missing Link all named ‘Partner of the…
An Industry Imperative to Increase Australia’s Cyber Resilience
It’s no doubt cybersecurity provides longevity to a business and can help differentiate it from…
Cyber War Security Guide for Endpoint Security
During the past decade, attackers have demonstrated incredible creativity in adjusting to changes in the security industry. Each…
How will Australia keep up
The UK’s National Crime Agency (NCA) has recently published its Cyber Crime Assessment 2016, highlighting…