Modern Listing Example

Protecting the enterprise in a world of hackers
As technology evolves, it is no surprise that information systems and the data they hold…

Protecting critical infrastructure from cyber attacks
Critical infrastructure providers are becoming acutely aware of how dependence on IT systems and connectivity…

Adopting “Ring of Defense” licensing strategy to reduce hacker theft
According to a study from IDC and Flexera Software, a significant proportion of software companies…

The illusion of ‘real time’ & ‘intelligence’ collection
Over the past year there has been an explosion of services being offered in the…

Attacks on the internet and cloud will continue
Fortinet, the global leader in high performance cybersecurity solutions that is based in Sunnyvale, California,…

Cyber security at sea
Aside from the big cyber stories of 2015, where traditional hacking saw criminals make off…

2016 – 2020: Game On! Innovation & Security versus Cyber & Terror Attacks
Australian Security Magazine, Feb/Mar 2016: http://issuu.com/apsm/docs/asm_jan_feb_2016_final “It is still three minutes to midnight: The probability…

Six business and technology trends to watch in 2016
2016 will be a pivotal year for organisations pursuing digital transformation strategies. While companies have…