Shop

  • Trends in Malware Attacks against United States Healthcare Organizations, 2016-2017

    Free

    Recently, the healthcare industry has been facing a new type of hazard; bad actors have started targeting hospitals and other healthcare facilities for cyberattacks. This industry is particularly vulnerable to cyberattacks because healthcare providers depend on up to date information from electronic health data.
  • Emergency Services Communications: Secure Chorus Compliant Products interoperability with Mission-Critical Push-to-Talk Products

    In response to unplanned events, geopolitical crises, natural and man-made disasters, public safety organisations and other relevant stakeholders require reliable, secure and interoperable multimedia communication technologies to support their operational effectiveness and service delivery.
  • How to Build a Micro-Segmentation Strategy

    Free

    Micro-Segmentation and Your Security Strategy: Why micro-segmentation? The perimeter doesn’t stop all bad actors from making it inside data centers and cloud environments. Regardless of how many detection technologies organizations use, something is bound to get through – a new virus, phishing emails, or a bad actor working at a company.
  • Economic and Political Overview 2019

    Free

    CEDA’s 2019 Economic and Political Overview (EPO) looks back at the economic and political events that shaped 2018 as well as looking ahead to 2019. A new addition for 2019 is an overview of policy and how it relates to economic and political outcomes. Issues are explored through both a domestic and international lens.
  • Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

    Free

    Synopsys, Inc. and SAE International, have released a report, Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices. Based on a survey of global automotive manufacturers and suppliers conducted by Ponemon Institute, the report highlights critical cybersecurity challenges and deficiencies affecting many organizations in the automotive industry.
  • RSA Quarterly Fraud Report

    Free

    The RSA® Quarterly Fraud Report contains fraud attack and consumer fraud data and analysis from the RSA Fraud and Risk Intelligence team. It represents a snapshot of the cyber fraud environment, providing actionable intelligence to consumer-facing organizations of all sizes and types to enable more effective digital risk management.
  • The State of Application Services 2019

    Free

    Deploying application services may be simple–but having the confidence to deliver applications anywhere and securely requires a little more groundwork. To find out what exactly was required for app-centric success, we surveyed close to 2,000 respondents in Asia Pacific in our fifth annual State of Application Services report.
  • The Future of IT Audit

    Free

    ISACA’s The Future of IT Audit: Research Brief reveals the opportunities and challenges that await the IT audit professional and sheds light on the IT audit profession in general. In this paper, ISACA presents survey findings related to the involvement of auditors in technology projects within their enterprise, the technology challenges faced by auditors, the perceived impact of automation and artificial intelligence (AI), and the IT audit staffing implications and workforce development issues caused by new technologies.
  • Email Fraud in Healthcare 2019 Report

    Free

    This Email Fraud in Healthcare report is designed to provide actionable intelligence you can use to better combat today's attacks, anticipate emerging threats and manage your security posture. Along with our findings, the report recommends steps you can take to protect your people, data and brand.
  • OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

    Register interest

    Study with us: There is already a high demand for graduates in cyber security and this is predicted to grow rapidly. Job opportunities in this field are challenging and provide exciting work with attractive salaries.
  • Bachelor of IT with a Major in Cyber Security (3 years)

    Register Interest or Apply before 3 March 2019

    This major provides you with various career opportunities, including:
    • Cyber security analyst
    • Cyber security system developer/programmer/manager
    • Defence force
    • Information security auditor
    • IT security engineer
    • Law enforcement
  • How to secure your crown jewel applications

    Free

    Protecting an organization’s most valuable assets or crown jewels is essential to protecting the organization from adverse monetary, reputational, and business continuity impact.