Shannon Brewster | Top Cybersecurity Leaders 2024

Shannon Brewster | Top Cybersecurity Leaders 2024

When Shannon Brewster took his first job out of college at a telecommunications company, he never would have thought his career would take him down the cybersecurity path. “In that job, as a Senior Enterprise Solutions Manager, I was exposed to cybersecurity elements in terms of the engineering of networks and designing of networks,” he recalls. That exposure certainly piqued his interest. In 2013, while working at AT&T as Director of Sales, Industry & Mobility…

Read More

Sushila Nair | Top Cybersecurity Leaders 2024

Sushila Nair | Top Cybersecurity Leaders 2024

As much as she’d like to say she spent her youth dreaming of a cybersecurity career, “that’s not really how it rolled out,” says Sushila Nair, Vice President, Head of Cybersecurity Services at Capgemini Americas, a global leader that partners with companies to transform and manage their business by unlocking the value of technology. “I initially started as an engineer,” Nair says. “The reason I studied engineering was I had a physics teacher who was…

Read More

The voices of security

The voices of security

As one of the preeminent security executive publications, the editorial team at Security magazine works to center the voices of security leaders via as many routes as possible. One of these avenues is via our podcast channel, The Security Podcasts. In addition to our monthly eMagazine and constant web coverage, Security magazine releases bite-sized podcast episodes featuring cybersecurity and physical security leaders from across the industry. From team leadership advice to explorations of emerging security…

Read More

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

The Australian government announced in 2023 that it would phase out the use of passwords to access key government digital service platform myGov. In the first half of 2024, Australians may be asked to adopt passkeys, which use individual biometric data to authenticate users. The myGov passkey push across the Australian population will pave the way for IT leaders to adopt this more secure form of authentication in the private sector as public awareness and…

Read More

Australian Organisations Face Tensions Between Personalisation, Privacy

Australian Organisations Face Tensions Between Personalisation, Privacy

Organisations in Australia face a significant challenge with data. On the one hand, there is a demand for personalised services. Consumers are willing to share their data if it means better personalisation. On the other hand, there is a real concern about privacy, and while organisations are focused on looking for ways to prevent data breaches, efforts to do better to protect customer privacy are more haphazard. Why organisations want data to deliver personalisation Personalisation…

Read More

Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Just the highlights Australia’s cyber security vision extends to 2030, with two federal elections occurring in that time frame. A lack of bipartisan agreement means businesses don’t have certainty on the long-term vision. A change in government might disrupt the later starters of the vision. The Australian government announced the 2023-2030 Australian Cyber Security Strategy, which aims to “help realise the Australian Government’s vision of becoming a world leader in cyber security.” Overall, the strategy…

Read More

95% of executives say AI initiatives will fail without training

95% of executives say AI initiatives will fail without training

95% of executives say AI initiatives will fail without training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre of Excellence, in a bid to increase the region’s shared cyber threat defences. The centre is a response to a changing threat landscape. At the opening of the ACICE, Singapore’s Ministry of Defence said Singapore alone experienced a 174% increase in phishing attempts between 2021 and 2022, while Southeast Asia…

Read More

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? The internet is a difficult space for Australian small and midsize businesses at the moment. Not only does the rate of innovation challenge them to adopt disruptive new technologies with minimal resources, but they also have to contend with the same cyber threats as all other businesses….

Read More

Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations

Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations

Image: Adobe/immimagery The not-for-profit sector is one of Australia’s biggest employers and revenue sources. 1.4 million people work in the not-for-profit sector in Australia, and another 3.2 million people volunteer. The overall revenue of the sector is $190 billion, and that money goes directly into supporting critical causes across the country. Unfortunately, according to new research by Infoxchange, the sector is ill-equipped to handle the security requirements of modern IT environments, and that is not…

Read More
1 4 5 6 7 8 129