The information on this page is intended for journalists, press and media. Click YES to get to the newsroom. If you click NO you will come back to Mynewsdesk.com.
Throughout March, our Executive Committee will be answering questions on what International Women’s Day means to them, what makes a brilliant leader, and what we can do as an industry to support the next generation of women.
How will cyber legislation change in the next decade? Kat Sommer, our head of public affairs, explores why collaboration matters when it comes to the future of cyber security law around the world.
In the lead up to International Women’s Day, we hosted a panel with some of our global colleagues to delve into their experiences of being a woman in the tech industry, and how we can inspire the next generation to pursue a career in tech.
January is a time for reflection, which most companies try to tap into by spamming you with predictions for the upcoming year, New Year’s resolutions and new solutions to old problems. My marketing department have convinced me to jump on the bandwagon, however ...
Cyber Security is often likened to a stool, with the three legs representing people, processes and technology. In business and the public sector, creating the right balance of investment between these three vital components is the greatest challenge faced by cyber security decision makers today.
For a company focused on core operations and meeting the needs of its stakeholders, it makes financial sense to handover non-core functions to third-party vendors. Unfortunately, this introduces a whole new element of risk in the company’s ecosystem – third party risk, of which cybersecurity is a critical component.
With increased demand for virtual card capabilities from Australian businesses, merchants and service providers, we keep being asked by our customers whether virtual payment cards are subject to Payment Card Industry Data Security Standard (PCI DSS). If they are, what would be the impact and their obligation against the payment standard? Mohammad Daneshvar explores...
As anyone working in cyber security knows, 100% threat prevention/mitigation is a myth. One question we hear time and time again is, “how much security is enough?” Sourya Biswas explains why there are so many different ways to answer this...
We’ve taken a look at the manifestos of the nationally significant UK political parties contesting the 2019 General Election to understand their commitment to cyber security.
When you choose to create a user account and follow a newsroom your personal data will be used by us and the owner of the newsroom, for you to receive news and updates according to your subscription settings.
To learn more about this, please read our Privacy Policy Users, which applies to our use of your personal data, and our Privacy Policy Contacts, which applies to the use of your personal data by the owner of the newsroom you follow.
Please note that our Terms of Use apply to all use of our services.
You can withdraw your consent at any time by unsubscribing or deleting your account
Email sent to __email__. Click the link there to follow NCC Group Newsroom.