GovHack is an annual open government data competition held all over Australia and New Zealand. Teams are eligible for some great prizes.
Continue ReadingStrategy
ACSC Information Security Manual
The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM).
Continue ReadingCyber Security Challenges
Cyber security challenges are a gamified way for you to develop and demonstrate practical skills needed by employers.
Continue ReadingCybersecurity Education Map
Are you are looking to study a cybersecurity or a related program at an Australian university or TAFE?
Continue ReadingCybersecurity Education
National Initiative for Cybersecurity Education (NICE) Workforce Framework.
Continue ReadingCyber Security NSW High School
In a sign of the times, NSW’s high school computer studies syllabus has been upgraded to focus more on cyber security.
Continue ReadingFacebook End-to-End Encryption
Tech editor Dan Howley outlines how Meta will be updating its Facebook Messenger app with end-to-end encryption amid privacy concerns.
Continue ReadingDefense in Depth
In this video, we’re going to be going over the network security concept of defense in depth, also security in depth or layered security.
Continue ReadingAndroid Malware Chinese Espionage
A group of cybersecurity researchers found Chinese spyware malware targeting Uyghurs, masquerading as Android apps.
Continue ReadingKids Learn to Hack
Kids learning to hack by coding, hacking. Just a few of the things middle school students learned in the Android Hacking 101 Workshop.
Continue ReadingNATO to Improve Cyber Defence
Following Russia’s invasion of Ukraine, the European Union has put forward two action plans to bolster cyber defence.
Continue ReadingMicrosoft Comprehensive Security
In today’s complex environment, organizations are looking for strong, comprehensive, and simplified security that helps them do more with less.
Continue ReadingIntegrating Multicloud Security
Multicloud Security is fundamentally flawed. As organizations adopt multiple clouds, security teams are faced with more complex threats.
Continue Reading