Top

The DevSecOps Shift Has Arrived The way applications are developed, deployed, accessed and used has changed. Infrastructures that were once contained and relatively straightforward to encircle with security measures have become complex and multi-cloud. Applications are now operationalised in tandem with

Yaron Slutzky, CISO for online travel agency Agoda, shares his thoughts on what it takes to be a CISO in this day and age Agoda CISO Yaron Slutzky has more than 15 years of experience in the cybersecurity domain. Prior to

The Council of Australasian University Directors of Information Technology (CAUDIT)’s Cybersecurity Program Director, Nikki Peever, shares insights on the pressing issues in cybersecurity for higher education in the region Ahead of CISO Brisbane 2022, taking place on the 6th of September

Coinhako’s Chief Information Security Officer Pasi Koistinen shares insights on the increasing adaptability of cyber threats as hybrid work uptake increases With 23 years under his belt as CISO and head of security across several companies, Pasi Koistinen now holds the

Australian Retirement Trust CISO Jason Anderson shares insights on protecting Australian retirement funds from information security threats Jason Anderson has been involved in information security for more than 20 years. He’s currently the CISO of Australian Retirement Trust, one of Australia's

Cybersecurity businessman and writer Chris Moschovitis discusses communicating the value of cybersecurity to the board and business functions of an organisation With the increased convergence of data privacy and cybersecurity, information security leaders must establish a pragmatic program alignment for their

Cyber Security Expert and Cybercrime Writer Mandy Turner discusses her career journey, driving cybersecurity value and collaboration, and protecting businesses from ransomware attacks. The cybercrime world is not for everyone. So what does it take for a cybercrime specialist to win

Members of the APAC cyber security team for one of Australia’s best-known employment marketplaces, SEEK, discuss their career journeys into cyber, the value of diversity and inclusion and their personal achievements Organisations across the globe are adopting diversity and inclusion as

What is 'Left of Boom' Cybersecurity? An increasingly hostile threat landscape demands that organisations balance incident detection and response methods with preventative measures.  The strategy of putting controls in place to mitigate potential threats before systems can be compromised has been

Loading