The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM).
Continue ReadingRegulation
Cybersecurity Education Map
Are you are looking to study a cybersecurity or a related program at an Australian university or TAFE?
Continue ReadingCybersecurity Education
National Initiative for Cybersecurity Education (NICE) Workforce Framework.
Continue ReadingTackling the Hackers
Ending the hackers ransomware attacks are a top priority as the European Parliament signed off on tough new cybersecurity rules.
Continue ReadingFacebook End-to-End Encryption
Tech editor Dan Howley outlines how Meta will be updating its Facebook Messenger app with end-to-end encryption amid privacy concerns.
Continue Reading$50 Million Fine Cyber-Attacks
After a lot of cyber-attacks, now companies that put your data at risk, or are hacked by cybercriminals, could face a minimum 50 million dollar fine.
Continue ReadingPosing as 13-Year-Old in Metaverse
Is your child venturing into the Metaverse and could they be getting into dangerous situations?
Continue ReadingOptus Hack AFP Operation Guardian
In response to Optus being hacked, the Australian Federal Police announces Operation Guardian to help 10,000 people who were breached in the cyber attack.
Continue ReadingAustralians Ready For Cyber Attacks
Millions of Australians are at risk after telecommunications company Optus was hacked. The question now is now are companies prepared for more cyber attacks?
Continue ReadingData Matters In Cybersecurity
Cybersecurity, Privacy, Data Protection, Internet Law and Policy.
Continue ReadingData Law Insights For Cybersecurity
Legal insights on navigating privacy, data protection, Cybersecurity, information governance, and e-discovery.
Continue ReadingData Counsel Cybersecurity
Legal Commentary Addressing Risks and Opportunities Concerning Cybersecurity.
Continue ReadingCashless Society the End of Freedom
Cashless society seems like a progression into an easier, faster and more convenient future. But this comes at a huge of cost of privacy and anonymity.
Continue Reading