This article aims to provide a comprehensive guide to performing effective 3rd party vendor security reviews, outlining key steps, best practices, and strategies to mitigate risks and ensure a robust security framework.
What I think are going to be the top 5 big cyber security themes in 2024.
It appears the Australian Federal Government is determined to do a Thelma & Louise and literally drive off a cliff into the abyss over truly mindless and ill-conceived legislation as concerns encryption, privacy and security. It has the potential to make us totally uncompetitive in global information technology markets and cut off at the knees a fledgling Read more about Will the last AU based start-up please turn off the light?[…]
The last 2 months have been a busy time for hackers; we look at what they have been doing and what can be learnt from them to improve computer security.
This a quick post to say that my first book has now been published on Amazon. In total its taken a good 9 months from the initial idea. The book focusses on Personal Information Security and how in business personal information needs to be secured and protected. The book is full of lots of practical Read more about First book published[…]