<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

Security in Focus

Striking the balance between data availability and security in ...

Recent news that Coplin Health Systems in the US was forced to notify 43,000 patients that their medical records had been stolen from a laptop placed a spotlight on the ...
READ MORE

IT security’s critical role in successful digital transformation

With growing numbers of organisations embracing digital transformation as a means of boosting efficiency
READ MORE

A last-minute guide to preparing your business for Australia's new ...

The deadline has been known for more than two years, yet many Australian organisations are still woefully unprepared for new data breach regulations that 
READ MORE

Why most cybercrimes are motivated by fraud and what you can do about ...

Cybercrime’s a business – and business is booming, writes Content Security’s Ken Pang… It’s tempting to think most cybercriminals are simple unskilled petty criminals. ...
READ MORE

The four pillars approach to ensuring effective personal information ...

With organisations gathering increasing volumes of personal information about their clients, ensuring it remains secure has never been 
READ MORE

The evolution of hacking and how small to medium businesses can ...

The popular stereotype of a cyber hacker tends to be a young, highly skilled person sitting in a darkened room surrounded by sophisticated computer equipment. It’s an ...
READ MORE

The rise of the "on-demand" Chief Information Security Officer

As companies strive to improve their levels of security in the midst of increasing cyber threats, many are finding it difficult to recruit sufficient numbers of skilled ...
READ MORE

IT security increasingly becoming a board-level issue

Many organisations have traditionally placed responsibility for their cybersecurity squarely in the hands of the IT department. This is a situation that is now rapidly ...
READ MORE

Protecting personal identities in an increasingly digital world

With a growing proportion of modern life being conducted online, the use of digital identities has never been more important and widespread. Used for everything from ...
READ MORE

Enterprise Security Architecture

Imagine we were given all the individual parts of a car and were asked to put it together, without any design or architecture documents. Firstly, it would be nearly ...
READ MORE