Modern Listing Example

Deception detection uncovered: Truth seeking through interrogation – Part 1
For years, researchers have been searching for the ‘Pinocchio’s nose’ of deception. As of today,…

Quick Q&A with Tom Patterson
Unisys’s Tom Patterson discusses his career as well as his latest work with Unisys Tom…

How can cyber risk management facilitate a more resilient organisation?
Greg Bolton is the Manager Governance & Risk at Powerlink Queensland, with over 20 years’ professional management…

Trend Micro (Dr Jon Oliver) commentary on Census 2016 hacking
Says Dr Jon Oliver, senior architect at Trend Micro: “I have complete confidence that the…

ACIC Illicit Drug Data Report
The Australian Criminal Intelligence Commission (ACIC) Illicit Drug Data Report 2014–15 provides a snapshot of…

Increased Cyber Threat Activity in Brazil
Global Cybersecurity Threat Report Provides Research on Advanced Threat Techniques and Data on Cyber Threats…

Palo Alto Networks raises the bar for endpoint security with updates to Traps advanced endpoint protection offering
Palo Alto Networks has announced new functionality, including significant machine learning capabilities for real-time unknown…

New Research Analyses Ransomware Behaviour and Evolving Enterprise Risk
Research Identifies Common Denominators Across Thousands of the Most Notorious Ransomware Types; Helps Enterprises Reduce…