procurement

How to choose secure, verifiable technologies?

How to choose secure, verifiable technologies? 2024-12-06 at 12:16 By Zeljka Zorz The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services […]

React to this headline:

Loading spinner

How to choose secure, verifiable technologies? Read More »

Organizations are changing cybersecurity providers in wake of Crowdstrike outage

Organizations are changing cybersecurity providers in wake of Crowdstrike outage 2024-09-23 at 15:46 By Zeljka Zorz More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. The recent

React to this headline:

Loading spinner

Organizations are changing cybersecurity providers in wake of Crowdstrike outage Read More »

Scroll to Top